P320W Support Notes
ICMP echo request packet to all hosts on the network. If there are numerous hosts, this will create a large amount of ICMP echo request packet, the resulting ICMP traffic will not only clog up the 'intermediary' network, but will also congest the network of the spoofed source IP address, known as the 'victim' network. This flood of broadcast traffic consumes all available bandwidth, making communications impossible.
What is IP Spoofing attack?
Many DoS attacks also use IP Spoofing as part of their attack. IP Spoofing may be used to break into systems, to hide the hacker's identity, or to magnify the effect of the DoS attack. IP Spoofing is a technique used to gain unauthorized access to computers by tricking a router or firewall into thinking that the communications are coming from within the trusted network. To engage in IP Spoofing, a hacker must modify the packet headers so that it appears that the packets originate from a trusted host and should be allowed through the router or firewall.
Wireless FAQ
What is a Wireless LAN?
Wireless LANs provide all the functionality of wired LANs, without the need for physical connections (wires). Data is modulated onto a radio frequency carrier and transmitted through the ether. Typical
What are the advantages of Wireless LANs?
a. Mobility:
Wireless LAN systems can provide LAN users with access to
b. Installation Speed and Simplicity:
Installing a wireless LAN system can be fast and easy and can eliminate the need to pull cable through walls and ceilings.
62
All contents copyright (c) 2005 ZyXEL Communications Corporation.