D-Link DRO-250i User Manual page 120

Hide thumbs Also See for DRO-250i:
Table of Contents

Advertisement

Introduction to DRO-250i
attacks: SYN Flooding, TCP Hijacking, LAND Attack, Win Nuke/
OOBNuke, Christmas Tree SYN / FIN (Jackal), SYN / FIN (zero-sized
DNS zone payload), BackOffice, NetBus, Smurf, Tear Drop, ICMP
Flooding.
Source port: - Displays the source IP address and the TCP/UDP port that
the intrusion was attempted from.
Destination port: - Displays the source IP address and the TCP/UDP port
that the intrusion was attempted.
For ICMP flood, Sync flood, and ECHO storm attacks destination IP,
destination port, source IP and source Port are logged as zero in the table shown in
the web-page. These fields are not considered for intrusion detection as the criteria
for the blocking is number of packets (packet count).
DRO-250i User Manual
119

Advertisement

Table of Contents
loading

Table of Contents