EasyManuals Logo

TP-Link T2600G Series User Manual

TP-Link T2600G Series
1136 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #965 background imageLoading...
Page #965 background image
User Guide 936
Configuring DoS Defend DoS Defend Configuration
NULL Scan The attacker sends the illegal packet with its TCP index and all the control fields
set to 0. During the TCP connection and data transmission, the packets with all
control fields set to 0 are considered illegal.
SYN sPort less
1024
The attacker sends the illegal packet with its TCP SYN field set to 1 and source
port smaller than 1024.
Blat Attack The attacker sends the illegal packet with the same source port and destination
port on Layer 4 and with its URG field set to 1. Similar to the Land Attack, the
system performance of the attacked host is reduced because the Host circularly
attempts to build a connection with the attacker.
Ping Flooding The attacker floods the destination system with Ping packets, creating a
broadcast storm that makes it impossible for the system to respond to legal
communication.
SYN/SYN-ACK
Flooding
The attacker uses a fake IP address to send TCP request packets to the server.
Upon receiving the request packets, the server responds with SYN-ACK packets.
Since the IP address is fake, no response will be returned. The server will keep
on sending SYN-ACK packets. If the attacker sends overflowing fake request
packets, the network resource will be occupied maliciously and the requests of
the legal clients will be denied.
WinNuke Attack Because the Operation System with bugs cannot correctly process the URG
(Urgent Pointer) of TCP packets, the attacker sends this type of packets to the
TCP port139 (NetBIOS) of the host with the Operation System bugs, which will
cause the host with a blue screen.
Ping of Death Ping of Death attack means that the attacker sends abnormal ping packets larger
than 65535 bytes to cause system crash on the target computer.
Note: Only T2600G-18TS supports Ping of Death.
Smurf Attack Smurf attack is a distributed denial-of-service attack in which large numbers of
Internet Control Message Protocol (ICMP) packets with the intended victim’s
spoofed source IP are broadcast to a computer network using an IP broadcast
address. Most devices on a network will, by default, respond to this by sending
a reply to the source IP address. If the number of machines on the network that
receive and respond to these packets is very large, the victim’s computer will be
flooded with traffic.
Note: Only T2600G-18TS supports Smurf Attack.
3) Click Apply.
2.2 Using the CLI
Follow these steps to configure DoS Defend:
Step 1 configure
Enter global configuration mode.

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the TP-Link T2600G Series and is the answer not in the manual?

TP-Link T2600G Series Specifications

General IconGeneral
ModelT2600G Series
LayerLayer 2+
TypeManaged
Uplink Ports4 x Gigabit SFP slots
VLAN4K VLANs
QoS8 priority queues
ManagementWeb-based GUI, CLI, SNMP, RMON
Standards and ProtocolsIEEE 802.3i, IEEE 802.3u, IEEE 802.3ab, IEEE 802.3z, IEEE 802.3ad, IEEE 802.3x, IEEE 802.1d, IEEE 802.1s, IEEE 802.1w, IEEE 802.1q, IEEE 802.1p, IEEE 802.3af, IEEE 802.3at
InterfaceRJ45
L2 FeaturesSTP, RSTP, MSTP, LACP, IGMP Snooping
L3 FeaturesStatic Routing
Security802.1X, Port Security, DHCP Snooping, IP Source Guard, DoS Defend, ARP Inspection, SSH, SSL, ACL
MAC Address Table16K
Jumbo Frame9KB
Operating Temperature0°C to 40°C
Storage Temperature-40°C to 70°C
Operating Humidity10% to 90% RH non-condensing
Storage Humidity5% to 90% non-condensing

Related product manuals