Zoom 4401 Network Router User Manual


 
Chapter 6. Firewall Settings 53
Whole System
Flood: FIN
This DoS attack involves large numbers of FIN
(Finish) packets, which terminate the
connection between the sender and recipient.
Select the check box and enter the number of
FIN
Packets/Second
that will be accepted.
Whole System
Flood: UDP
This type of attack sends a large amount of
traffic to ports 7 and 19 on LAN clients.
Select the check box and enter the number of
UDP
Packets/Second
that will be accepted.
Whole System
Flood: ICMP
This type of attack involves large numbers of
ICMP (
I
nternet
C
ontrol
M
essage
P
rotocol)
requests, such as ping or netmask, etc.
Select the check box and enter the number of
ICMP
Packets/Second
that will be accepted.
Per Source IP
Flood: SYN
This type of attack involves large numbers of
SYN packets with the source address spoofed
(faked) to appear to be the address of a LAN
client.
Select the check box and enter the number of
SYN
Packets/Second
that will be accepted.
Per Source IP
Flood: FIN
This type of attack involves large numbers of
FIN (Finish) packets, with the source address
spoofed to appear to be the address of a LAN
client.
Select the check box and enter the number of
FIN
Packets/Second
that will be accepted.
Per Source IP
Flood: UDP
This type of attack involves a large amount of
traffic directed to ports 7 and 19 on LAN
clients. In these messages the source address
is spoofed to appear to be the address of a
LAN client.
Select the check box and enter the number of
UDP
Packets/Second
that will be accepted.
Per Source IP
Flood: ICMP
This type of attack involves large numbers of
ICMP (
I
nternet
C
ontrol
M
essage
P
rotocol)
requests, such as ping or netmask, etc., with
the source address spoofed to appear to be
the address of a LAN client.
Select the check box and enter the number of
ICMP
Packets/Second
that will be accepted.