Chapter 3 Configuration
Src MAC: Enter the source MAC address.
Dest MAC: Enter the destination MAC address.
Type: Enter the Ethernet type.
Block Forward: Check Block if you want to block requests from the source MAC address sending to the destination MAC address. Check Forward if you want to forward requests from the source MAC address sending to the destination MAC address.
3.4.3.5.3 Intrusion Detection
Check “Enable” if you want to detect invader sneak in your computer without permitted .The ADSL Router can automatically detect and block the DoS (Denial of Service) attack if user enables this function. This kind of attack is not to achieve the confidential data of this network; instead, it aims to crush specific equipment or the entire network. If this happens, the users will not be able to access the network resources. There are few samples of hacker patterns implemented as below.
-IP Spoofing
-Ping of Death (Length > 65535)
-Land Attack (Same source / destination IP address)
-IP with zero length
-Sync flooding
-Smurf Attack (ICMP Echo with x.x.x.0 or x.x.x.255)
-Snork Attack
-UDP port
-TCP NULL scan
37