Motorola Netopia 3300 User's Guide Page 151

  • Download
  • Add to my manuals
  • Print
  • Page
    / 279
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 150
151
Links Bar
Excessive Pings. The PING (Packet InterNet Groper) Utility is used by hackers to iden-
tify prospective targets that can be attacked. The Security Monitoring software will record
instances where the router itself is pinged by the same host more than ten times.
Logged information includes:
Login Failures. The Netopia software provides the means for assigning passwords to
the Admin or User accounts to control access to the Gateway. Any attempts to login are
given three chances to enter a valid password. The Security Monitoring software records
instances where the user fails to enter a valid password.
Logged information includes:
MAC Address Spoofing. A MAC (Media Access Control) Address Spoofing Attack can
be identified based on the IP-interface where the illegitimate packet came from. If the inter-
face that the spoofed packet arrives on does not have the same MAC address as the legit-
imate entry in the routing table, then an attack is logged.
Logged information includes:
• Highest port • Lowest port
• Port numbers of first 10 ports scanned
• IP source address • IP destination address
• Number of attempts • Time at last attempt
• IP source address • Number of attempts
• Attempt count • Time at last attempt
• IP source address • Number of attempts
• IP interface • Time at last attempt
Page view 150
1 2 ... 146 147 148 149 150 151 152 153 154 155 156 ... 278 279

Comments to this Manuals

No comments