D-Link DIS-200G Emulator - Page 105

DoS Attack Prevention Settings, TCP SYN SrcPort Less 1024

Page 105 highlights

DIS-200G Series Industrial Gigabit Ethernet Smart Managed Switch DoS Attack Prevention Settings This window is used to view and configure the Denial-of-Service (DoS) attack prevention settings. The following well-known DoS types which can be detected by most switches: • Land Attack: This type of attack involves IP packets where the source and destination address are set to the address of the target device. It may cause the target device to reply to itself continuously. • Blat Attack: This type of attack will send packets with the TCP/UDP source port equal to the destination port of the target device. It may cause the target device to respond to itself. • TCP-Null: This type of attack involves port scanning by using specific packets which contain a sequence number of 0 and no flags. • TCP-Xmas: This type of attack involves port scanning by using specific packets which contain a sequence number of 0 and the Urgent (URG), Push (PSH), and FIN flags. • TCP SYN-FIN: This type of attack involves port scanning by using specific packets which contain SYN and FIN flags. • TCP SYN SrcPort Less 1024: This type of attack involves port scanning by using specific packets which contain source port 0 to 1023 and SYN flag. • Ping Death Attack: A ping of death is a type of attack on a computer that involves sending a malformed or otherwise a malicious ping to a computer. A ping is normally 64 bytes in size (many computers cannot handle a ping larger than the maximum IP packet size) which is 65535 bytes. The sending of a ping of this size can crash the target computer. Traditionally, this bug has been relatively easy to exploit. Generally, sending a 65536 byte ping packet is illegal according to networking protocol, but a packet of such a size can be sent if it is fragmented; when the target computer reassembles the packet, a buffer overflow can occur, which often causes a system crash. • All Types: All of above types. To view the following window, click Security > DoS Attack Prevention Settings, as shown below: Figure 8-10 DoS Attack Prevention Settings window The fields that can be configured for DoS Attack Prevention Settings are described below: Parameter DoS Type Selection State Action Description Tick the DoS type option that will be prevented here. Select to enable or disable the DoS attack prevention feature's global state here. Select the action that will be taken when the DoS attack was detected here. The only option to select here is Drop. 95

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161

DIS-200G Series Industrial Gigabit Ethernet Smart Managed Switch
95
DoS Attack Prevention Settings
This window is used to view and configure the Denial-of-Service (DoS) attack prevention settings. The
following well-known DoS types which can be detected by most switches:
Land Attack
: This type of attack involves IP packets where the source and destination address
are set to the address of the target device. It may cause the target device to reply to itself
continuously.
Blat Attack
: This type of attack will send packets with the TCP/UDP source port equal to the
destination port of the target device. It may cause the target device to respond to itself.
TCP-Null
: This type of attack involves port scanning by using specific packets which contain a
sequence number of 0 and no flags.
TCP-Xmas
: This type of attack involves port scanning by using specific packets which contain a
sequence number of 0 and the Urgent (URG), Push (PSH), and FIN flags.
TCP SYN-FIN
: This type of attack involves port scanning by using specific packets which
contain SYN and FIN flags.
TCP SYN SrcPort Less 1024
: This type of attack involves port scanning by using specific
packets which contain source port 0 to 1023 and SYN flag.
Ping Death Attack
: A ping of death is a type of attack on a computer that involves sending a
malformed or otherwise a malicious ping to a computer. A ping is normally 64 bytes in size
(many computers cannot handle a ping larger than the maximum IP packet size) which is 65535
bytes. The sending of a ping of this size can crash the target computer. Traditionally, this bug
has been relatively easy to exploit. Generally, sending a 65536 byte ping packet is illegal
according to networking protocol, but a packet of such a size can be sent if it is fragmented;
when the target computer reassembles the packet, a buffer overflow can occur, which often
causes a system crash.
All Types
: All of above types.
To view the following window, click
Security > DoS Attack Prevention Settings
, as shown below:
The fields that can be configured for
DoS Attack Prevention Settings
are described below:
Parameter
Description
DoS Type Selection
Tick the DoS type option that will be prevented here.
State
Select to enable or disable the DoS attack prevention feature’s
global state here.
Action
Select the action that will be taken when the DoS attack was
detected here. The only option to select here is Drop.
Figure 8-
10
DoS Attack Prevention Settings window