Specifications
315
DoS Attack Type Description
Ping Flooding
The attacker floods the destination system with Ping broadcast storm
packets to forbid the system to respond to the legal communication.
SYN/SYN-ACK
Flooding
The attacker uses a fake IP address to send
TCP request packets to
the Server. Upon receiving the request packets, the Server responds
with SYN-
ACK packets. Since the IP address is fake, no response will
be returned. The Server will keep on sending SYN-ACK packets. If the
attacker sends overflowing
fake request packets, the network resource
will be occupied maliciously and the requests of the legal clients will be
denied.
Table 14-1 Defendable DoS Attack Types
14.5.1 DoS Defend
On this page, you can enable the DoS Defend type appropriate to your need.
Choose the menu Network Security→DoS Defend→DoS Defend to load the following page.
Figure 14-18 DoS Defend
The following entries are displayed on this screen:
Defend Config
DoS Defend:
Allows you to Enable/Disable DoS Defend function.
Defend Table
Select:
Select the entry to enable the corresponding Defend Type.
Defen
d Type: Displays the Defend Type name.