Alcatel-Lucent OmniAccess 700 CLI Command Reference Manual page 636

Release versions: 2.2; 2.2-r02; 2.3
Table of Contents

Advertisement

ip-zero-length
ip-land-attack
tcp-xmas-scan
tcp_-invalid-urgent-offset
tcp-null-scan
tcp-syn-fin
tcp-fin-no-ack
udp-fraggle-attack
You can create a "default" attack setting to check only the stateless attacks by
using the keyword "default stateless".
The following attacks are the Default Stateless (Default Non-Rate Limiting)
attacks:
ip-tear-drop
ip-tiny-frag
icmp-ping-of-death
ip-zero-length
icmp-smurf-attack
ip-land-attack
tcp-xmas-scan
tcp_-invalid-urgent-offset
tcp-null-scan
tcp-syn-fin
tcp-fin-no-ack
udp-fraggle-attack
Note:
Some of the fragmentation attacks, in particular teardrop attack, tiny fragment attack,
and TCP header fragment attacks are detected by the fragment handling code even if
the corresponding attacks have not been configured. This will happen for any traffic
that is subject to any firewall configuration, i.e., either filter, NAT or DoS configuration.
This is why you can see these attacks in the "show" output even when he has not
configured them.
OmniAccess 700 CLI Command Reference Guide
Beta
Except on the first page, right running head:
Heading1 or Heading1NewPage text (automatic)
-
-
-
-
-
-
-
-
-
50
50
-
-
-
-
-
-
-
-
-
Alcatel-Lucent
default
-
-
-
-
-
-
-
-
-
64
65507
-
-
-
-
-
-
-
-
-
603
Beta

Advertisement

Table of Contents
loading

Table of Contents