TP-Link T2500-28TCTL-SL5428E T2500-28TCUN V1 User Guide - Page 231

DoS Defend, DoS Attack Type, Description, Network Security, DoS Defend, Defend Config

Page 231 highlights

DoS Attack Type Description Ping Of Death ICMP ECHO Request Packet whose sum of "Fragment Offset" and "Total Length" fields in the IP header is greater than 65535 may cause Ping of Death attack. As the maximum packet length of an IPv4 packet including the IP header is 65,535 bytes, many computer systems could not properly handle this malformed or malicious ICMP ECHO Request Packet. Thus, the hosts may break down or reboot automatically when receive this kind of packet. Table 13-1 Defendable DoS Attack Types 13.5.1 DoS Defend On this page, you can enable the DoS Defend type appropriate to your need. Choose the menu Network Security→DoS Defend→DoS Defend to load the following page. Figure 13-18 DoS Defend The following entries are displayed on this screen:  Defend Config DoS Defend: Allows you to Enable/Disable DoS Defend function. Ping Limiting: Specify the transmission rate of the Ping packets when the Defend Type Ping Flooding is enabled. SYN Limiting: Specify the transmission rate of the SYN/SYN-ACK packets when the Defend Type SYN/SYN-ACK Flooding is enabled.  Defend Table Select: Select the entry to enable the corresponding Defend Type. 221

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316

221
DoS Attack Type
Description
Ping Of Death
ICMP ECHO Request Packet whose sum of "Fragment Offset" and
"Total Length" fields in the IP header is greater than 65535 may cause
Ping of Death attack. As the maximum packet length of an IPv4 packet
including the IP header is 65,535 bytes, many computer systems could
not properly handle this malformed or malicious ICMP ECHO Request
Packet. Thus, the hosts may break down or reboot automatically when
receive this kind of packet.
Table 13-1 Defendable DoS Attack Types
13.5.1 DoS Defend
On this page, you can enable the DoS Defend type appropriate to your need.
Choose the menu
Network Security
DoS Defend
DoS Defend
to load the following page.
Figure 13-18 DoS Defend
The following entries are displayed on this screen:
Defend Config
DoS Defend:
Allows you to Enable/Disable DoS Defend function.
Ping Limiting:
Specify the transmission rate of the Ping packets when the Defend
Type Ping Flooding is enabled.
SYN Limiting:
Specify the transmission rate of the SYN/SYN-ACK packets when
the Defend Type SYN/SYN-ACK Flooding is enabled.
Defend Table
Select:
Select the entry to enable the corresponding Defend Type.