Operation Manual
Vigor120 Series User’s Guide
39
Also the Vigor modem monitors the traffic. Any abnormal traffic flow violating the
pre-defined parameter, such as the number of thresholds, is identified as an attack and the
Vigor modem will activate its defense mechanism to mitigate in a real-time manner.
The below shows the attack types that DoS/DDoS defense function can detect:
1. SYN flood attack
2. UDP flood attack
3. ICMP flood attack
4. Port Scan attack
5. IP options
6. Land attack
7. Smurf attack
8. Trace route
9. SYN fragment
10. Fraggle attack
11. TCP flag scan
12. Tear drop attack
13. Ping of Death attack
14. ICMP fragment
15. Unknown protocol
Below shows the menu items for Firewall.
4
4
.
.
4
4
.
.
2
2
G
G
e
e
n
n
e
e
r
r
a
a
l
l
S
S
e
e
t
t
u
u
p
p
General Setup allows you to adjust settings of IP Filter and common options. Here you can
enable or disable the Call Filter or Data Filter. Under some circumstance, your filter set can
be linked to work in a serial manner. So here you assign the Start Filter Set only. Also you
can configure the Log Flag settings, Apply IP filter to VPN incoming packets, and Accept
incoming fragmented UDP packets.
Click Firewall and click General Setup to open the general setup page.
Call Filter Check Enable to activate the Call Filter function. Assign a start
filter set for the Call Filter.
Data Filter Check Enable to activate the Data Filter function. Assign a start
filter set for the Data Filter.