Prestige 2602H-6xC Support Notes

SYN-ACK, it queues up all outstanding SYN-ACK responses on what is known as a backlog queue. SYN-ACKs are moved off the queue only when an ACK comes back or when an internal timer (which is set a relatively long intervals) terminates the TCP three-way handshake. Once the queue is full , the system will ignore all incoming SYN requests, making the system unavailable for legitimate users.

What is LAND attack?

In a LAN attack, hackers flood SYN packets to the network with a spoofed source IP address of the targeted system. This makes it appear as if the host computer sent the packets to itself, making the system unavailable while the target system tries to respond to itself.

What is Brute-force attack?

A Brute-force attack, such as 'Smurf' attack, targets a feature in the IP specification known as directed or subnet broadcasting, to quickly flood the target network with useless data. A Smurf hacker flood a destination IP address of each packet is the broadcast address of the network, the router will broadcast the ICMP echo request packet to all hosts on the network. If there are numerous hosts, this will create a large amount of ICMP echo request packet, the resulting ICMP traffic will not only clog up the 'intermediary' network, but will also congest the network of the spoofed source IP address, known as the 'victim' network. This flood of broadcast traffic consumes all available bandwidth, making communications impossible.

What is IP Spoofing attack?

Many DoS attacks also use IP Spoofing as part of their attack. IP Spoofing may be used to break into systems, to hide the hacker's identity, or to magnify the effect of the DoS attack. IP Spoofing is a technique used to gain unauthorized access to computers by tricking a router or firewall into thinking that the communications are coming from within the trusted network. To engage in IP Spoofing, a hacker must modify the packet headers so that it appears that the packets originate from a trusted host and should be allowed through the router or firewall.

What are the default ACL firewall rules in Prestige?

There are two default ACLs pre-configured in the Prestige, one allows all connections from LAN to WAN and the other blocks all connections from WAN to LAN except of the DHCP packets.

120

All contents copyright (c) 2005 ZyXEL Communications Corporation.

Page 120
Image 120
ZyXEL Communications 2602H-6XC manual What is Land attack?, What is Brute-force attack?, What is IP Spoofing attack?

2602H-6XC specifications

ZyXEL Communications has established itself as a leader in developing versatile networking solutions, and the ZyXEL 2602H-6XC is a testament to the brand’s commitment to excellence in wireless technology. This dual-band wireless router is engineered to deliver robust performance and reliability for both residential and small business environments.

One of the standout features of the ZyXEL 2602H-6XC is its dual-band capability. Operating on both the 2.4 GHz and 5 GHz frequencies, this router enables users to enjoy high-speed internet access while reducing congestion. The 2.4 GHz band is ideal for devices that require a longer range, such as smartphones and tablets, whereas the 5 GHz band benefits bandwidth-intensive activities like online gaming and HD streaming, providing a seamless experience without interruptions.

The device supports the latest Wi-Fi 5 (802.11ac) technology, which enhances wireless performance by offering greater data rates and improved throughput. With combined wireless speeds of up to 1167 Mbps, the ZyXEL 2602H-6XC is designed to accommodate multiple devices simultaneously, making it perfect for busy households or small offices where various tasks are being performed concurrently.

Security is a top priority in today’s digital age, and the ZyXEL 2602H-6XC comes equipped with advanced security features including WPA3 encryption, enabling more secure connections and protecting user data. Additionally, the router includes a built-in firewall and supports VPN passthrough, providing an extra layer of protection for both personal and professional use.

The ZyXEL 2602H-6XC also boasts a user-friendly interface, allowing for straightforward setup and management. Users can easily configure parental controls, prioritize bandwidth for specific devices, and monitor network activity through a web-based interface or compatible mobile app. This ensures that families and businesses can maintain optimal control over their network usage.

On the hardware side, the ZyXEL 2602H-6XC is equipped with multiple Gigabit Ethernet ports, ensuring high-speed wired connections for devices that require stable connections, such as gaming consoles and desktop computers. Furthermore, the inclusion of USB ports allows for network sharing of printers and storage devices, making it a versatile addition to any setup.

In summary, the ZyXEL 2602H-6XC is a powerful and flexible wireless router that integrates modern technologies to enhance connectivity, security, and management. Its dual-band capabilities, support for Wi-Fi 5, robust security features, and user-friendly interface make it an excellent choice for anyone seeking to improve their home or office networking experience.