Parameter

Select or enter . . .

 

 

Whole System

This type of attack sends large numbers of

Flood: SYN

SYN (Synchronization or Start Connection)

 

packets, which create “half-open” connections

 

to the Internet and prevent the AP+4 from

 

accepting any new requests to connect.

 

Select the check box and enter the number of

 

SYN Packets/Second that will be accepted.

Whole System

This DoS attack involves large numbers of FIN

Flood: FIN

(Finish) packets, which terminate the

 

connection between the sender and recipient.

 

Select the check box and enter the number of

 

FIN Packets/Second that will be accepted.

Whole System

This type of attack sends a large amount of

Flood: UDP

traffic to ports 7 and 19 on LAN clients.

 

Select the check box and enter the number of

 

UDP Packets/Second that will be accepted.

Whole System

This type of attack involves large numbers of

Flood: ICMP

ICMP (Internet Control Message Protocol)

 

requests, such as ping or netmask, etc.

 

Select the check box and enter the number of

 

ICMP Packets/Second that will be accepted.

Per Source IP

This type of attack involves large numbers of

Flood: SYN

SYN packets with the source address spoofed

 

(faked) to appear to be the address of a LAN

 

client.

 

Select the check box and enter the number of

 

SYN Packets/Second that will be accepted.

Per Source IP

This type of attack involves large numbers of

Flood: FIN

FIN (Finish) packets, with the source address

 

spoofed to appear to be the address of a LAN

 

client.

 

Select the check box and enter the number of

 

FIN Packets/Second that will be accepted.

Per Source IP

This type of attack involves a large amount of

Flood: UDP

traffic directed to ports 7 and 19 on LAN

 

clients. In these messages the source address

 

is spoofed to appear to be the address of a

 

LAN client.

 

Select the check box and enter the number of

 

UDP Packets/Second that will be accepted.

58

Zoom AP+4 User Guide