Enable Block IP Options | Activates the Block IP options function. The router will ignore |
| any IP packets with IP option field appearing in the datagram |
| header. |
Enable Block Land | Activates the Block Land function. A Land attack occurs when |
| an attacker sends spoofed SYN packets with |
| identical source address, destination addresses and port number |
| as those of the victim. |
Enable Block Smurf | Activates the Block Smurf function. The router will reject any |
| ICMP echo request destined for the broadcast address. |
Enable Block Trace Route | Activates the Block trace route function. The router will not |
| forward any trace route packets. |
Enable Block SYN | Activates the Block SYN fragment function. Any packets |
Fragment | having the SYN flag and fragmented bit sets will be dropped. |
Enable Block Fraggle | Activates the Block fraggle Attack function. Any broadcast |
Attack | UDP packets received from the Internet are blocked. |
Enable TCP Flag Scan | Activates the Block TCP flag scan function. Any TCP packet |
| with an anomalous flag setting is dropped. These scanning |
| activities include no flag scan, FIN without ACK scan, SYN |
| FIN scan, Xmas scan and full Xmas scan. |
Enable Tear Drop | Activates the Block Tear Drop function. This attack involves |
| the perpetrator sending overlapping packets to the target hosts |
| so that target host will hang once they |
| The routers will block any packets resembling this attacking |
| activity. |
Enable Ping of Death | Activates the Block Ping of Death function. Many machines |
| may crash when receiving an ICMP datagram that exceeds the |
| maximum length. The router will block any fragmented ICMP |
| packets with a length greater than 1024 octets. |
Enable Block ICMP | Activates the Block ICMP fragment function. Any ICMP |
Fragment | packets with fragmented bit sets are dropped. |
Enable Block Unknown | Activates the Block Unknown Protocol function. The router |
Protocol | will block any packets with unknown protocol types. |
Click Apply to apply the settings when you finish the configuration.
3.4.3 URL Filter
The Internet contains a wide range of offenses or illegal materials. Unlike traditional media, the Internet does not have any obvious tools to segregate materials based on URL strings or content. URL content filtering systems are seen as tools that would provide the cyberspace equivalent of the physical separations that are used to limit access to particular materials. By
Vigor3300 Series User’s Guide | 83 |