Parameter | Select or enter . . . |
|
|
TCP Syn with | Select this check box to defend against an |
Data | attack where the TCP port scanner generates |
| a SYN packet. If the target port is open, it will |
| respond with a |
| responds with a RST packet, closing the |
| connection before the handshake is |
| completed. |
|
|
UDP Bomb | Select this check box to defend against an |
| attack which overloads the operating system |
| and makes the target device difficult or |
| impossible to use. |
|
|
UDP Echo | Select this check box to defend against an |
Chargen | attack on UDP ports 7 and 19 involving large |
| numbers of ECHO and CHARGEN requests. |
|
|
Select All | Click to select all types of attacks listed. |
|
|
Clear All | Click to clear all selected types of attack. |
|
|
Enable Source IP | Select this check box to block all packets |
Blocking | coming from a source IP address. |
Block Time | Enter the number of seconds during which all |
| traffic from a source IP address will be |
| blocked. |
|
|
Apply Changes | Click to save your entries. |
|
|
60 | Zoom AP+4 User Guide |