PAMSPAN501x G.SHDSL.bis EFM Gateway
-
81
Echo Storm
Attackers send oversized ICMP datagram to your device using ping in an attempt to
crash, freeze or cause a reboot. The device detects an attempted Echo Storm
attack if it receives more than 15 ICMP datagram per second from a single host. To
modify this default threshold, enter:
security set IDS MaxPING <max>
Once this threshold is exceeded, traffic originating from the attacker is blocked for
1800 seconds by default. To modify this default duration, enter:
security set IDS DOSattackblock <duration>
Boink
An attacker sends fragmented TCP packets that are too big to be reassembled on
arrival, causing Microsoft Windows 95 and Windows NT machines to crash.
Traffic originating from the attacker is blocked by the router for 1800 seconds by
default. To modify this default duration, enter:
security set IDS DOSattackblock <duration>
Land Attack
This attack targets Microsoft Windows machines. An attacker sends a forged
packet with the same source and destination IP address which confuses the
victim’s machine, causing it to crash or reboot.
Traffic originating from the attacker is blocked for 1800 seconds by default. To
modify this default duration, enter:
security set IDS DOSattackblock <duration>
Ping of Death
It is possible to crash, reboot or otherwise kill a large number of systems by
sending a ping of a certain size from a remote machine. This ping is defined as a
ping of death when the ping payload exceeds 65535 bytes.
Traffic originating from the attacker is blocked for 1800 seconds by default. To