ZyXEL Communications P-660H-TX ユーザーズマニュアル

ページ / 89
                                         
P-660H-Tx v2 Support Notes
 
11 What is Brute-force attack?   
A Brute-force attack, such as 'Smurf' attack, targets a feature in the IP 
specification known as directed or subnet broadcasting, to quickly flood the 
target network with useless data. A Smurf hacker flood a destination IP 
address of each packet as the broadcast address of the network, the router will 
broadcast the ICMP echo request packet to all hosts on the network. If there 
are numerous hosts, this will create a large amount of ICMP echo request 
packet, the resulting ICMP traffic will not only clog up the 'intermediary' 
network, but will also congest the network of the spoofed source IP address, 
known as the 'victim' network. This flood of broadcast traffic consumes all 
available bandwidth, making communications impossible.   
12. What is IP Spoofing attack?   
Many DoS attacks also use IP Spoofing as part of their attack. IP Spoofing 
may be used to break into systems, to hide the hacker's identity, or to magnify 
the effect of the DoS attack. IP Spoofing is a technique used to gain 
unauthorized access to computers by tricking a router or firewall into thinking 
that the communications are coming from within the trusted network. To 
engage in IP Spoofing, a hacker must modify the packet headers so that it 
appears that the packets originate from a trusted host and should be allowed 
through the router or firewall.   
13. What are the default ACL firewall rules in P-660H-Tx v2?   
There are two default ACLs pre-configured in the P-660H-Tx v2, one allows all 
connections from LAN to WAN and the other blocks all connections from WAN 
to LAN except of the DHCP packets.   
 
Configuration 
1. How do I configure the firewall?   
You can use the Web Configurator to configure the firewall for P-660H-Tx v2. 
By factory default, if you connect your PC to the LAN Interface of P-660H-Tx 
v2, you can access Web Configurator via ‘http://192.168.1.1’. 
Note: Don’t forget to type in the Administrator Password.     
2. How do I prevent others from configuring my firewall?   
There are several ways to protect others from touching the settings of your 
firewall.  
                                     
22 
All contents copyright © 2006 ZyXEL Communications Corporation.