ZyXEL Communications 320W manual What is IP Spoofing attack?, What is a Wireless LAN?

Page 62

P320W Support Notes

ICMP echo request packet to all hosts on the network. If there are numerous hosts, this will create a large amount of ICMP echo request packet, the resulting ICMP traffic will not only clog up the 'intermediary' network, but will also congest the network of the spoofed source IP address, known as the 'victim' network. This flood of broadcast traffic consumes all available bandwidth, making communications impossible.

What is IP Spoofing attack?

Many DoS attacks also use IP Spoofing as part of their attack. IP Spoofing may be used to break into systems, to hide the hacker's identity, or to magnify the effect of the DoS attack. IP Spoofing is a technique used to gain unauthorized access to computers by tricking a router or firewall into thinking that the communications are coming from within the trusted network. To engage in IP Spoofing, a hacker must modify the packet headers so that it appears that the packets originate from a trusted host and should be allowed through the router or firewall.

Wireless FAQ

What is a Wireless LAN?

Wireless LANs provide all the functionality of wired LANs, without the need for physical connections (wires). Data is modulated onto a radio frequency carrier and transmitted through the ether. Typical bit-rates are 11Mbps and 54Mbps, although in practice data throughput is half of this. Wireless LANs can be formed simply by equipping PC's with wireless NICs. If connectivity to a wired LAN is required an Access Point (AP) is used as a bridging device. AP's are typically located close to the centre of the wireless client population.

What are the advantages of Wireless LANs?

a. Mobility:

Wireless LAN systems can provide LAN users with access to real-time information anywhere in their organization. This mobility supports productivity and service opportunities not possible with wired networks.

b. Installation Speed and Simplicity:

Installing a wireless LAN system can be fast and easy and can eliminate the need to pull cable through walls and ceilings.

62

All contents copyright (c) 2005 ZyXEL Communications Corporation.

Image 62
Contents Prestige 320W P320W Support Notes Ireless FAQ Trouble Shooting Internet Connection Ethernet connectionSetting up the Prestige router TCP/IP InstallationTCP/IP Configuration P320W Support Notes P320W Support Notes Configure an Internal Server Behind SUA Service Port Number SmtpUsing the Dynamic DNS Ddns Network Management Using Snmp Snmp OverviewP320W Support Notes SNMPv1 Operations Set GetGetNext TrapZyXEL Snmp Implementation Configure the Prestige for Snmp Get CommunityTraffic Redirect on LAN port Using Prestige traffic redirectSet Community Using Universal Plug n Play UPnP What is UPnPUsing UPnP in ZyXEL devices Go to Management-UPnP, check Enable UPnP service P320W Support Notes Finally, your video conversation is achieved Infrastructure Mode What is Infrastructure mode?P320W Support Notes Configuration Wireless Station to Infrastructure mode P320W Support Notes Double click on the AP you want to associated with Wireless MAC Address Filtering MAC Filter OverviewConfigure the Wlan MAC Filter ZyXEL MAC Filter ImplementationWEP Configuration IntroductionP320W Support Notes Setting up the Access Point Key settings Setting up the StationP320W Support Notes P320W Support Notes Ieee Ieee 802.1x IntroductionSupplicant AuthenticatorAuthentication Server Authentication Port State and Authentication Control Re-Authentication Eapol Exchange between 802.1x Authenticator and Supplicant P320W Support Notes Using WEB Configuration Using External Radius Authentication Server P320W Support Notes Site Survey Preparation Survey on SiteP320W Support Notes P320W Support Notes FAQ What is the P320W 802.11g Wireless Firewall Router?What do I need to use the Prestige? What is PPPoE?Will the P320W work with my Internet connection? Does the Prestige support PPPoE?How can I configure the Prestige? How do I know I am using PPPoE?Why does my provider use PPPoE? Which Internet Applications can I use with the Prestige?How does e-mail work through the Prestige? What Dhcp capability does the Prestige support? How fast can the data go?Your ISP checks the MAC address Your ISP checks the Host Name What is BOOTP/DHCP What is DdnsWhen do I need Ddns service? What are the basic types of firewalls? What is a network firewall?What makes P320W secure? What is Denials of Service DoS attack? What kind of firewall is the P320W?What is SYN Flood attack? What is Ping of Death attack?What is Teardrop attack? What is Land attack?What are the advantages of Wireless LANs? What is IP Spoofing attack?What is a Wireless LAN? What is an Access Point? What are the disadvantages of Wireless LANs?Where can you find wireless 802.11 networks? What is 802.11a? What is Ieee 802.11?What is 802.11b? What is 802.11g?Can radio signals pass through walls? What is Wi-Fi?Does the 802.11 interfere with Bluetooth devices? Is it possible to use products from a variety of vendors?How many Access Points are required in a given area? What is Ad Hoc mode?What is Infrastructure mode? Whats the difference between a Wlan and a WWAN?Why the 2.4 Ghz Frequency range? What is Direct-Sequence Spread Spectrum Technology DSSS?What is Frequency-hopping Spread Spectrum Technology FHSS? What is Server Set ID SSID?What is the difference between 40-bit and 64-bit WEP? What is an ESSID?What is WEP? What is a WEP key?What are Insertion Attacks? What is Wireless Sniffer?Can the Ssid be encrypted? Open SystemWhat is RADIUS? What is 802.1x?What is AAA? Why cannot access the Prestige from my computer? Why cannot access the Internet?Your ISP checks the MAC address Application Outgoing Connection Incoming Connection Unable to run applicationsZyXEL SUA Supporting Table NAT-T P320W Support Notes