EasyManua.ls Logo

ZyXEL Communications VMG1312-B Series - 15.1.2 What You Need to Know

ZyXEL Communications VMG1312-B Series
376 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Chapter 15 Firewall
VMG1312-B Series User’s Guide
218
15.1.2 What You Need to Know
SYN Attack
A SYN att ack floods a t arget ed system with a series of SYN packets. Each packet causes t he
targeted system to issue a SYN-ACK response. While t he t argeted system waits for t he ACK that
follows the SYN-ACK, it queues up all outstanding SYN-ACK responses on a backlog queue. SYN-
ACKs are m oved off t he queue only when an ACK com es back or w hen an int ernal tim er t erm inates
the t hree- way handshake. Once the queue is full, the system will ignore all incom ing SYN r equests,
m aking the system unavailable for legitim at e users.
DoS
Denials of Service ( DoS) att acks are aim ed at devices and net w orks with a connect ion to the
I nternet. Their goal is not to st eal inform ation, but t o disable a device or net work so users no longer
have access to net work resources. The ZyXEL Device is pre- configured to aut om at ically det ect and
thwart all known DoS att acks.
DDoS
A DDoS att ack is one in which m ultiple com prom ised syst em s at tack a single target , ther eby
causing denial of service for user s of the t argeted system .
LAND Attack
I n a LAND att ack, hackers flood SYN packet s into the network with a spoofed source I P address of
the t arget syst em . This m akes it appear as if the host com put er sent t he packets to it self, m aking
the syst em unavailable while t he target syst em tries t o respond to itself.
Ping of Death
Ping of Deat h uses a " ping" ut ility t o creat e and send an I P packet t hat exceeds the m axim um
65,536 byt es of dat a allowed by t he I P specification. This m ay cause system s t o crash, hang or
reboot .
SPI
St ateful Packet I nspect ion ( SPI ) tracks each connect ion crossing t he firewall and m akes sure it is
valid. Filtering decisions are based not only on rules but also context . For exam ple, traffic from the
WAN m ay only be allowed to cr oss the firewall in response t o a request from the LAN.

Table of Contents

Related product manuals