Filter and Firewall
Left running head:
Chapter name (automatic)
630
Beta
Beta
OmniAccess 700 CLI Command Reference Guide
Alcatel-Lucent
UDP
-
FRAGGLE
-
ATTACK
udp-fraggle-attack
D
ESCRIPTION
When a perpetrator sends a large number of UDP echo (ping) traffic at IP
broadcast addresses, all of it having a fake source address, it causes system
crash or denial of service. The above command is included in the default attack
prevention list to secure the system from this attack.
P
ARAMETERS
None.
E
XAMPLE
ALU(config-firewall-attack-A1)# udp-fraggle-attack
UDP
-
PORT
-
LOOPBACK
udp-port-loopback
[
threshold
<
1-4294967295
> <
1-4294967295
>]
D
ESCRIPTION
A UDP packet travels between two "echoing" ports. Such packets can bounce
infinite number of times, using up network bandwidth and CPU. An intruder can
cause problems by spoofing a packet from one machine and send it to
another.The malicious intruder could generate lots of these packets in order to
totally overwhelm the systems and network. This keyword is included with
appropriate parameters in the default list.
P
ARAMETERS
D
EFAULT
V
ALUE
•
2 packets per 10 milliseconds
•
5,000 microseconds is the Default
E
XAMPLE
ALU(config)# attack A4
ALU(config-attack A4)# udp-port-loopback threshold 30 13
Parameter
Description
threshold
Threshold limit set.
1-4294967295
Number of packets permissible within a
defined interval.
1-4294967295
The limiting time to which the packets
can be sent.