
8
Chapter 2 - Getting to Know the Internet Security Router
ASUS SL1200
Table 2.3. DoS Attacks
Type of Attack Name of Attacks
Re-assembly attacks Bonk, Boink, Teardrop (New Tear), Overdrop, Opentear,
Syndrop, Jolt
ICMP Attacks Ping of Death, Smurf, Twinge
Flooders ICMP Flooder, UDP Flooder, SYN Flooder
Port Scans TCP XMAS Scan, TCP Null Scan, TCP SYN Scan, TCP
Stealth Scan
TCP Attacks TCP sequence number prediction, TCP out-of sequence
attacks
Protection with PF Rules Echo-Chargen, Ascend Kill
Miscellaneous Attacks IP Spoofing, LAND, Targa, Tentacle MIME Flood,
Winnuke, FTP Bounce, IP unaligned time stamp attack
2.4.1.4 Application Level Gateway (ALG)
Applications such as FTP, and games dynamically open connections
based on the respective application parameter. To go through the rewall
on the router, packets pertaining to an application, require a corresponding
allow rule. In the absence of such rules, the packets will be dropped by
the router's firewall. As it is not feasible to create policies for numerous
applications dynamically (without compromising security), intelligence in
the form of Application Level Gateways (ALG), is built to parse packets
for applications and open dynamic associations. The firewall provides
a number of ALGs for popular applications such as FTP, H.323, RTSP,
Microsoft Games, and SIP.
2.4.1.5 URL Filtering
A set of keywords that should not appear in the Uniform Resource Locator,
(URL such as
www.yahoo.com
) can be dened. Any URL containing one
or more of these keywords will be blocked. This is a policy independent
feature. It cannot be associated to ACL rules. This feature can be
independently enabled or disabled, but works only if rewall is enabled.
2.4.1.6 Log and Alerts
Events in the network, which could affect its security, are recorded in the
router's System log file. Event details are recorded in the WebTrends
Enhanced Log Format (WELF) format so that statistical tools can be
Comentários a estes Manuais