Skip to content
ezenos manual Logo ezenos manual Logo
  • Overview
  • Setup Wizard
  • System Status
    • Overview
    • Routes
    • System Log
    • Realtime Graphs
    • Legacy Graphs
    • Host Statistics
    • App Statistics
  • Network Setting
    • Interface Overview
    • WAN_4G Configuration
    • WAN Config
    • LAN Config
    • DHCP
    • DNS
    • Hostnames
    • Static Routes
    • Dynamic DNS
    • Switch
  • Wi-Fi Setting
    • Basic Setting
    • Guest Network
    • Advanced Setting
    • User Status
    • Wi-Fi Relay
  • Multi-WAN
    • Multi-WAN Policy
    • Multi-Dial
  • QoS Control
    • Smart QoS Control
    • IP Rate Limit
  • Network Security
    • ARP Binding
    • ARP Security
    • ARP Trust
    • MAC Filter
    • Port Mapping
    • Connections Limit
    • Anti-DDoS
  • Group Object
    • Group IP
    • Group Time
    • Group Port
    • Group APP
    • Group MAC
    • Group Domain
  • Behavior Management
    • One-click Management
    • Firewall ACL
    • URL Filter
    • URL Record
    • URL Redirect
    • DNS Filter
  • VPN
    • PPTP Server
    • PPTP Client
    • L2TP Server
    • L2TP Client
    • IPSec
  • Authentications
    • PPPoE Server
    • Account Manage
    • User List
    • Push Message
  • Advanced Set
    • Advanced Interface Set
    • Eth Mode
    • UPnP
    • Port Mirror
    • VLAN
    • Set WAN Number
    • Wake on LAN
    • PPPoE Relay
  • System Manager
    • System Settings
    • Router Password
    • Join Cloud
    • Cron Task
    • Backup / Restore
    • Reset to Defaults
    • Web Port
    • Flash Firmware
    • Feature Library
    • Reboot
  • System Tools
    • Diagnostics
    • Lasting Ping
    • Speed Test
    • Conntrack Tool
    • LED On/Off
    • Backup WiFi Factory

Anti-DDoS

Anti-DDoSastadm2019-05-02T07:24:07+00:00

Anti DDoS

The principle of DDoS attack consumes a large number of resources, which causes the routing system to refuse service, which seriously affects normal Internet access.

For example, the SYN attack is a feature of the three-way handshake negotiation of TCP. The first SYN packet is sent at a time so that the router responds to the SYN-ACK packet after receiving the SYN packet, and the attacker ignores the SYN-ACK packet. The connection cannot be created, so the router consumes system resources and continuously retransmits the message. A large number of SYN packets will cause the system resources of the router to be exhausted. Finally, the phenomenon of dropped calls will occur. The source of a DDOS attack can originate not only from the intranet but also from the extranet.

Deny LAN to LAN forwarding
The internal network is forbidden to forward. The main purpose is to isolate multiple subnets on the internal network.

Note:
The threshold for UDP attack defense is generally not higher than 2000. Intranet fake IP attacks can prevent fake IP from initiating syn flood attacks.

ezenos © Copyright   |  All Rights Reserved
Page load link
Go to Top