Network Attacks - An Overview
Except on the first page, right running head:
Heading1 or Heading1NewPage text (automatic)
671
Alcatel-Lucent
Beta
Beta
CLI Configuration Guide
D
EFAULT
A
TTACKS
(
N
ON
-
RATE
L
IMITING
/ S
TATELESS
)
ICMP
-
PING
-
OF
-
DEATH
icmp-ping-of-death
[{
max-frag-num
|
max-total-length
} <
1-
4294967295
>]
The TCP/IP specification requires a specific packet size for datagram
transmission. Many ping implementations allow you to specify a larger packet size
if desired. A grossly oversized ICMP packet can trigger a range of adverse system
reactions such as denial of service (DoS), crashing, freezing, and rebooting. This
command is included in the default attack prevention list to secure the system
from this attack.
IP
-
LAND
-
ATTACK
ip-land-attack
A LAND attack consists of a stream of TCP SYN packets that have the source IP
address and TCP port number set to the same value as the destination address
and port number (i.e., that of the attacked host).
IP
-
TEAR
-
DROP
ip-tear-drop
Teardrop attack tool attacks the vulnerability of the TCP/IP IP fragmentation re-
assembly codes which do not properly handle the overlapping IP fragments.
IP
-
TINY
-
FRAG
ip-tiny-frag
[{
max-frag-num
|
min-frag-size
} <
1-4294967295
>]
If the fragment size is made small enough to force some of a TCP packet's TCP
header fields into the second fragment, filter rules that specify patterns for those
fields will not match. If the filtering implementation does not enforce a minimum
fragment size, a disallowed packet might be passed because it didn't hit a match
in the filter. The above keyword is also turned on by default. If you wish to disable
this, you can override this keyword and then turn it on when necessary with a
specified minimum fragment size in the user-defined attack prevention list.
IP
-
ZERO
-
LENGTH
ip-zero-length
This kind of denial of service attack is caused when a 0-length IP fragment is
received as the first fragment in the list.
A series of such IP fragments of 0 length being the first in the fragment list, makes
it impossible for the kernel to deallocate the destination entry and remove it from
the cache, resulting in a Denial -of Service. To avoid the attack, this keyword is
also placed in the default list.
Summary of Contents for OmniAccess 700
Page 38: ...Left running head Chapter name automatic 12 Beta Beta CLI Configuration Guide Alcatel Lucent ...
Page 176: ...Left running head Chapter name automatic 150 Beta Beta CLI Configuration Guide Alcatel Lucent ...
Page 260: ...Left running head Chapter name automatic 234 Beta Beta CLI Configuration Guide Alcatel Lucent ...
Page 434: ...Left running head Chapter name automatic 408 Beta Beta CLI Configuration Guide Alcatel Lucent ...
Page 464: ...Left running head Chapter name automatic 438 Beta Beta CLI Configuration Guide Alcatel Lucent ...
Page 638: ...Left running head Chapter name automatic 612 Beta Beta CLI Configuration Guide Alcatel Lucent ...
Page 940: ...Left running head Chapter name automatic 914 Beta Beta CLI Configuration Guide Alcatel Lucent ...
Page 1002: ...Left running head Chapter name automatic 976 Beta Beta CLI Configuration Guide Alcatel Lucent ...
Page 1120: ...Left running head Chapter name automatic 2 Beta Beta CLI Configuration Guide Alcatel Lucent ...