Specifications

315
DoS Attack Type Description
Ping Flooding
The attacker floods the destination system with Ping broadcast storm
packets to forbid the system to respond to the legal communication.
SYN/SYN-ACK
Flooding
The attacker uses a fake IP address to send
TCP request packets to
the Server. Upon receiving the request packets, the Server responds
with SYN-
ACK packets. Since the IP address is fake, no response will
be returned. The Server will keep on sending SYN-ACK packets. If the
attacker sends overflowing
fake request packets, the network resource
will be occupied maliciously and the requests of the legal clients will be
denied.
Table 14-1 Defendable DoS Attack Types
14.5.1 DoS Defend
On this page, you can enable the DoS Defend type appropriate to your need.
Choose the menu Network SecurityDoS DefendDoS Defend to load the following page.
Figure 14-18 DoS Defend
The following entries are displayed on this screen:
Defend Config
DoS Defend:
Allows you to Enable/Disable DoS Defend function.
Defend Table
Select:
Select the entry to enable the corresponding Defend Type.
Defen
d Type: Displays the Defend Type name.