ZyWALL 10 Internet Security Gateway
TracerouteTraceroute is a utility used to determine the path a packet takes between two endpoints. Sometimes when a packet filter firewall is configured incorrectly an attacker can traceroute the firewall gaining knowledge of the network topology inside the firewall.
TeardropTeardrop attacks exploit weaknesses in the reassembly of IP packet fragments. As data is transmitted through a network, IP packets are often broken up into smaller chunks. Each fragment looks like the original IP packet except that it contains an offset field that says, for instance, "This fragment is carrying bytes 200 through 400 of the original (non fragmented) IP packet." The Teardrop program creates a series of IP fragments with overlapping offset fields. When these fragments are reassembled at the destination, some systems will crash, hang, or reboot.
SYN FloodSYN Attack floods a targeted system with a series of SYN packets. Each packet causes the targeted system to issue a
Attack types and some background are described in more detail in Chapter 13.
# | Time |
| Packet Information | Reason | Action |
124 | Jan 1 00 | From:192.168.1.2 To: 10.100.6.45 | not match | none | |
| 00:01:30 | TCP src port:01060 dest port:00119 | <2,01>protocol |
| |
125 | Jan 1 | 00 | From:192.168.1.2 To: 10.100.6.66 | match | block |
| 22:10:10 | UDP src port:01053 dest port:00053 | <1,02> |
| |
126 | Jan 1 | 00 | From:192.168.1.2 To: 10.100.6.66 | not match | none |
| 23:10:30 | UDP src port:01054 dest port:00053 | <1,02>dest port |
| |
127 | Jan 1 | 00 | From:192.168.1.2 To: 10.100.6.45 | attack | block |
| 23:20:30 | ICMP type:00008 code:00000 | land |
|
Clear Firewall Log (y/n):
FigureEach log consists of two lines, showing the information described in the following table.
Introducing the ZyWALL Firewall |