Zoom 5697 Modem User Manual


 
Chapter 6: Using Router Setup
107
The following table shows you the values you can enter:
Setting Description
Use Blacklist Blacklisting denies an external host
access to your computer/network if an
intrusion from a host has been detected.
Access to the network is denied for ten
minutes.
Victim Protection
Block Duration
The length of time that packets destined
for the victim of a spoofing attack are
blocked.
Use Victim
Protection
Protection for your system against
broadcast pings. An attacker sends out a
ping with a broadcast destination
address and a spoofed source address.
Packets destined for the victim of a
spoofing attack are blocked for a
specified duration.
DOS Attack Block
Duration
The duration that hosts are blocked
once a Denial of Service (DOS) attack is
detected.
Scan Attack Block
Duration
The length of time that traffic from IP
addresses doing the port scan are
blocked once a port scan is detected.
Port scans are used to determine if you
have any open ports that can be
accessed.
Maximum TCP
Open
Handshaking
Count
Sets the maximum number of TCP open
session requests allowed per second
before a SYN flood attack is detected.
SYN Flood is a specific type of DOS
attack.