Left running head:
Chapter name (automatic)
Filter and Firewall
-
-
TCP
FIN
SCAN
tcp-fin-scan
D
ESCRIPTION
TCP FIN flooding. To secure system from this kind of flooding, this command is
placed in the default attack prevention list.
P
ARAMETERS
None.
E
XAMPLE
ALU(config-firewall-attack-A1)# tcp-fin-scan
-
-
TCP
HEADER
FRAG
tcp-header-frag
D
ESCRIPTION
In this attack, a TCP header is split into multiple frames in an attempt to bypass
firewalls or intrusion detection systems. This could lead to secure information also
being passed through the filter. To retain security, this command also forms a part
of the default attack prevention list.
P
ARAMETERS
None.
E
XAMPLE
ALU(config-firewall-attack-A1)# tcp-header-frag
-
-
TCP
INVALID
URGENT
tcp-invalid-urgent-offset
D
ESCRIPTION
The intruder sends a TCP frame with an Urgent pointer which points past the end
of the data. This may cause some TCP/IP implementations to become unstable or
crash. Some TCP/IP implementations will hang when receiving many such
frames.
P
ARAMETERS
None.
E
XAMPLE
ALU(config-firewall-attack-A1)# tcp-invalid-urgent-offset
626
Beta
-
OFFSET
Alcatel-Lucent
OmniAccess 700 CLI Command Reference Guide
Beta