TP-Link OC200 Omada Controller Software 4.1.5Windows/Linux User Guide - Page 102
Stationary Source TCP, SYN Flood, Flood, single client to the specified rate.
View all TP-Link OC200 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 102 highlights
Chapter 4 Configure the Network with Omada SDN Controller Stationary Source TCP SYN Flood A TCP SYN flood attack occurs when the attacker sends the target system with a succession of SYN (synchronize) requests. When the system responds, the attacker does not complete the connections, thus leaving the connection half-open and flooding the system with SYN messages. No legitimate connections can then be made. With this feature enabled, the gateway limits the rate of receiving TCP SYN packets from a single client to the specified rate. Stationary Source UDP Flood A UDP flood attack occurs when the attacker sends a large number of UDP packets to a target host in a short time, the target host is busy with these UDP packets and cannot process normal services. With this feature enabled, the gateway limits the rate of receiving UDP packets from a single client to the specified rate. Stationary Source ICMP Flood If an attacker sends many ICMP Echo messages to the target device, the target device is busy with these Echo messages and cannot process other data packets. Therefore, normal services are affected. With this feature enabled, the system limits the rate of receiving ICMP packets from a single clients to the specified rate. 100