
Parameter | Select or enter . . . |
|
|
Whole System | This type of attack sends large numbers of |
Flood: SYN | SYN (Synchronization or Start Connection) |
| packets, which create |
| to the Internet and prevent the AP+4 from |
| accepting any new requests to connect. |
| Select the check box and enter the number of |
| SYN Packets/Second that will be accepted. |
Whole System | This DoS attack involves large numbers of FIN |
Flood: FIN | (Finish) packets, which terminate the |
| connection between the sender and recipient. |
| Select the check box and enter the number of |
| FIN Packets/Second that will be accepted. |
Whole System | This type of attack sends a large amount of |
Flood: UDP | traffic to ports 7 and 19 on LAN clients. |
| Select the check box and enter the number of |
| UDP Packets/Second that will be accepted. |
Whole System | This type of attack involves large numbers of |
Flood: ICMP | ICMP (Internet Control Message Protocol) |
| requests, such as ping or netmask, etc. |
| Select the check box and enter the number of |
| ICMP Packets/Second that will be accepted. |
Per Source IP | This type of attack involves large numbers of |
Flood: SYN | SYN packets with the source address spoofed |
| (faked) to appear to be the address of a LAN |
| client. |
| Select the check box and enter the number of |
| SYN Packets/Second that will be accepted. |
Per Source IP | This type of attack involves large numbers of |
Flood: FIN | FIN (Finish) packets, with the source address |
| spoofed to appear to be the address of a LAN |
| client. |
| Select the check box and enter the number of |
| FIN Packets/Second that will be accepted. |
Per Source IP | This type of attack involves a large amount of |
Flood: UDP | traffic directed to ports 7 and 19 on LAN |
| clients. In these messages the source address |
| is spoofed to appear to be the address of a |
| LAN client. |
| Select the check box and enter the number of |
| UDP Packets/Second that will be accepted. |
58 | Zoom AP+4 User Guide |