Udp-Fraggle-Attack; Udp-Port-Loopback - Alcatel-Lucent OmniAccess 700 CLI Command Reference Manual

Release versions: 2.2; 2.2-r02; 2.3
Table of Contents

Advertisement

Left running head:
Chapter name (automatic)
Filter and Firewall
-
-
UDP
FRAGGLE
ATTACK

udp-fraggle-attack

D
ESCRIPTION
When a perpetrator sends a large number of UDP echo (ping) traffic at IP
broadcast addresses, all of it having a fake source address, it causes system
crash or denial of service. The above command is included in the default attack
prevention list to secure the system from this attack.
P
ARAMETERS
None.
E
XAMPLE
ALU(config-firewall-attack-A1)# udp-fraggle-attack
-
-
UDP
PORT
LOOPBACK
udp-port-loopback [threshold <1-4294967295> <1-4294967295>]
D
ESCRIPTION
A UDP packet travels between two "echoing" ports. Such packets can bounce
infinite number of times, using up network bandwidth and CPU. An intruder can
cause problems by spoofing a packet from one machine and send it to
another.The malicious intruder could generate lots of these packets in order to
totally overwhelm the systems and network. This keyword is included with
appropriate parameters in the default list.
P
ARAMETERS
threshold
1-4294967295
1-4294967295
D
V
EFAULT
ALUE
2 packets per 10 milliseconds
5,000 microseconds is the Default
E
XAMPLE
ALU(config)# attack A4
ALU(config-attack A4)# udp-port-loopback threshold 30 13
630
Beta
Parameter
Alcatel-Lucent
Description
Threshold limit set.
Number of packets permissible within a
defined interval.
The limiting time to which the packets
can be sent.
OmniAccess 700 CLI Command Reference Guide
Beta

Advertisement

Table of Contents
loading

Table of Contents