Zoom 4420-A User Manual

Page 53

Advertising
background image

Chapter 6. Firewall Settings

53

Whole System
Flood: FIN

This DoS attack involves large numbers of FIN
(Finish) packets, which terminate the
connection between the sender and recipient.
Select the check box and enter the number of
FIN Packets/Second that will be accepted.

Whole System
Flood: UDP

This type of attack sends a large amount of
traffic to ports 7 and 19 on LAN clients.
Select the check box and enter the number of
UDP Packets/Second that will be accepted.

Whole System
Flood: ICMP

This type of attack involves large numbers of
ICMP (Internet Control Message Protocol)
requests, such as ping or netmask, etc.
Select the check box and enter the number of
ICMP Packets/Second that will be accepted.

Per Source IP
Flood: SYN

This type of attack involves large numbers of
SYN packets with the source address spoofed
(faked) to appear to be the address of a LAN
client.
Select the check box and enter the number of
SYN Packets/Second that will be accepted.

Per Source IP
Flood: FIN

This type of attack involves large numbers of
FIN (Finish) packets, with the source address
spoofed to appear to be the address of a LAN
client.
Select the check box and enter the number of
FIN Packets/Second that will be accepted.

Per Source IP
Flood: UDP

This type of attack involves a large amount of
traffic directed to ports 7 and 19 on LAN
clients. In these messages the source address
is spoofed to appear to be the address of a
LAN client.
Select the check box and enter the number of
UDP Packets/Second that will be accepted.

Per Source IP
Flood: ICMP

This type of attack involves large numbers of
ICMP (Internet Control Message Protocol)
requests, such as ping or netmask, etc., with
the source address spoofed to appear to be
the address of a LAN client.
Select the check box and enter the number of
ICMP Packets/Second that will be accepted.

Advertising
This manual is related to the following products: