ZyXEL Communications 320W manual What is Ping of Death attack?, What is Teardrop attack?

Page 61

P320W Support Notes

2.Those that exploits weaknesses in the TCP/IP specification such as SYN Flood and LAND Attacks.

3.Brute-force attacks that flood a network with useless data such as Smurf attack.

4.IP Spoofing

What is Ping of Death attack?

Ping of Death uses a 'PING' utility to create an IP packet that exceeds the maximum 65535 bytes of data allowed by the IP specification. The oversize packet is then sent to an unsuspecting system. Systems may crash, hang, or reboot.

What is Teardrop attack?

Teardrop attack exploits weakness in the reassemble of the IP packet fragments. As data is transmitted through a network, IP packets are often broken up into smaller chunks. Each fragment looks like the original packet except that it contains an offset field. The Teardrop program creates a series of IP fragments with overlapping offset fields. When these fragments are reassembled at the destination, some systems will crash, hang, or reboot.

What is SYN Flood attack?

SYN attack floods a targeted system with a series of SYN packets. Each packet causes the targeted system to issue a SYN-ACK response, while the targeted system waits for the ACK that follows the SYN-ACK, it queues up all outstanding SYN-ACK responses on what is known as a backlog queue.

SYN-ACKs are moved off the queue only when an ACK comes back or when an internal timer (which is set a relatively long intervals) terminates the TCP three-way handshake. Once the queue is full, the system will ignore all incoming SYN requests, making the system unavailable for legitimate users.

What is LAND attack?

In a LAN attack, hackers flood SYN packets to the network with a spoofed source IP address of the targeted system. This makes it appear as if the host computer sent the packets to itself, making the system unavailable while the target system tries to respond to itself.

What is Brute-force attack?

A Brute-force attack, such as 'Smurf' attack, targets a feature in the IP specification known as directed or subnet broadcasting, to quickly flood the target network with useless data. A Smurf hacker flood a destination IP address of each packet is the broadcast address of the network, the router will broadcast the

61

All contents copyright (c) 2005 ZyXEL Communications Corporation.

Image 61
Contents Prestige 320W P320W Support Notes Ireless FAQ Trouble Shooting Ethernet connection Internet ConnectionTCP/IP Configuration TCP/IP InstallationSetting up the Prestige router P320W Support Notes P320W Support Notes Configure an Internal Server Behind SUA Smtp Service Port NumberUsing the Dynamic DNS Ddns Snmp Overview Network Management Using SnmpP320W Support Notes SNMPv1 Operations GetNext GetSet TrapZyXEL Snmp Implementation Get Community Configure the Prestige for SnmpSet Community Using Prestige traffic redirectTraffic Redirect on LAN port What is UPnP Using Universal Plug n Play UPnPUsing UPnP in ZyXEL devices Go to Management-UPnP, check Enable UPnP service P320W Support Notes Finally, your video conversation is achieved What is Infrastructure mode? Infrastructure ModeP320W Support Notes Configuration Wireless Station to Infrastructure mode P320W Support Notes Double click on the AP you want to associated with MAC Filter Overview Wireless MAC Address FilteringZyXEL MAC Filter Implementation Configure the Wlan MAC FilterIntroduction WEP ConfigurationP320W Support Notes Setting up the Access Point Setting up the Station Key settingsP320W Support Notes P320W Support Notes Ieee 802.1x Introduction IeeeAuthentication Server AuthenticatorSupplicant Authentication Port State and Authentication Control Re-Authentication Eapol Exchange between 802.1x Authenticator and Supplicant P320W Support Notes Using WEB Configuration Using External Radius Authentication Server P320W Support Notes Site Survey Survey on Site PreparationP320W Support Notes P320W Support Notes What is the P320W 802.11g Wireless Firewall Router? FAQWill the P320W work with my Internet connection? What is PPPoE?What do I need to use the Prestige? Does the Prestige support PPPoE?Why does my provider use PPPoE? How do I know I am using PPPoE?How can I configure the Prestige? Which Internet Applications can I use with the Prestige?How does e-mail work through the Prestige? How fast can the data go? What Dhcp capability does the Prestige support?Your ISP checks the MAC address Your ISP checks the Host Name What is Ddns What is BOOTP/DHCPWhen do I need Ddns service? What makes P320W secure? What is a network firewall?What are the basic types of firewalls? What kind of firewall is the P320W? What is Denials of Service DoS attack?What is Teardrop attack? What is Ping of Death attack?What is SYN Flood attack? What is Land attack?What is a Wireless LAN? What is IP Spoofing attack?What are the advantages of Wireless LANs? Where can you find wireless 802.11 networks? What are the disadvantages of Wireless LANs?What is an Access Point? What is 802.11b? What is Ieee 802.11?What is 802.11a? What is 802.11g?Does the 802.11 interfere with Bluetooth devices? What is Wi-Fi?Can radio signals pass through walls? Is it possible to use products from a variety of vendors?What is Infrastructure mode? What is Ad Hoc mode?How many Access Points are required in a given area? Whats the difference between a Wlan and a WWAN?What is Frequency-hopping Spread Spectrum Technology FHSS? What is Direct-Sequence Spread Spectrum Technology DSSS?Why the 2.4 Ghz Frequency range? What is Server Set ID SSID?What is WEP? What is an ESSID?What is the difference between 40-bit and 64-bit WEP? What is a WEP key?Can the Ssid be encrypted? What is Wireless Sniffer?What are Insertion Attacks? Open SystemWhat is AAA? What is 802.1x?What is RADIUS? Why cannot access the Internet? Why cannot access the Prestige from my computer?Your ISP checks the MAC address ZyXEL SUA Supporting Table Unable to run applicationsApplication Outgoing Connection Incoming Connection NAT-T P320W Support Notes