beautypg.com

Asus RX3141 User Manual

Page 15

background image

RX3141 User’s Manual

Chapter 2 Getting to Know

5

Table 2.1. DoS Attacks

Type of Attack

Name of Attacks

Re-assembly attacks

Bonk, Boink, Teardrop (New Tear), Overdrop,
Opentear, Syndrop, Jolt, IP fragmentation overlap

ICMP Attacks

Ping of Death, Smurf, Twinge

Flooders

Logging only for ICMP Flooder, UDP Flooder, SYN
Flooder

Port Scans

Logging only for TCP SYN Scan
Attack packets dropped: TCP XMAS Scan, TCP Null

Scan, TCP Stealth Scan

Protection with PF Rules

Echo-Chargen, Ascend Kill

Miscellaneous Attacks

IP Spoofing, LAND, Targa, Winnuke

2.4.1.1

Application Level Gateway (ALG)

Applications such as FTP open connections dynamically based on the respective application parameter. To go
through the firewall on the RX3141, packets pertaining to an application, require a corresponding allow rule. In
the absence of such rules, the packets will be dropped by the RX3141 Firewall. As it is not feasible to create
policies for numerous applications dynamically (at the same time without compromising security), intelligence
in the form of Application Level Gateways (ALG), is built to parse packets for applications and open dynamic
associations. The RX3141 NAT provides a number of ALGs for popular applications such as FTP, and
Netmeeting.

2.4.1.2 Log

Events in the network, that could be attempts to affect its security, are recorded in the RX3141 system log file.
The log maintains a minimum log details such as, time of packet arrival, description of action taken by Firewall
and reason for action.