–
309
–
Chapter 12
| Security Measures
DoS Protection
victim. The victim should crash due to the many interrupts required to send
ICMP Echo response packets. (Default: Enabled)
◆
TCP Flooding Attack
–
Attacks in which a perpetrator sends a succession of
TCP SYN requests (with or without a spoofed-Source IP) to a target and never
returns ACK packets. These half-open connections will bind resources on the
target, and no new connections can be made, resulting in a denial of service.
(Default: Disabled)
◆
TCP Flooding Attack Rate
–
Maximum allowed rate. (Range: 64-2000 kbits/
second; Default: 1000 kbits/second)
◆
TCP Null Scan
–
A TCP NULL scan message is used to identify listening TCP
ports. The scan uses a series of strangely configured TCP packets which contain
a sequence number of 0 and no flags. If the target's TCP port is closed, the
target replies with a TCP RST (reset) packet. If the target TCP port is open, it
simply discards the TCP NULL scan. (Default: Enabled)
◆
TCP-SYN/FIN Scan
–
A TCP SYN/FIN scan message is used to identify listening
TCP ports. The scan uses a series of strangely configured TCP packets which
contain SYN (synchronize) and FIN (finish) flags. If the target's TCP port is
closed, the target replies with a TCP RST (reset) packet. If the target TCP port is
open, it simply discards the TCP SYN FIN scan. (Default: Enabled)
◆
TCP Xmas Scan
–
A so-called TCP XMAS scan message is used to identify
listening TCP ports. This scan uses a series of strangely configured TCP packets
which contain a sequence number of 0 and the URG, PSH and FIN flags. If the
target's TCP port is closed, the target replies with a TCP RST packet. If the target
TCP port is open, it simply discards the TCP XMAS scan. (Default: Enabled)
◆
UDP Flooding Attack
–
Attacks in which a perpetrator sends a large number of
UDP packets (with or without a spoofed-Source IP) to random ports on a
remote host. The target will determine that application is listening at that port,
and reply with an ICMP Destination Unreachable packet. It will be forced to
send many ICMP packets, eventually leading it to be unreachable by other
clients. (Default: Disabled)
◆
UDP Flooding Attack Rate
–
Maximum allowed rate. (Range: 64-2000 kbits/
second; Default: 1000 kbits/second)
◆
WinNuke Attack
–
Attacks in which affected the Microsoft Windows 3.1x/95/
NT operating systems. In this type of attack, the perpetrator sends the string of
OOB out-of-band (OOB) packets contained a TCP URG flag to the target
computer on TCP port 139 (NetBIOS), casing it to lock up and display a “Blue
Screen of
Death.”
This did not cause any damage to, or change data on, the
computer’s hard disk, but any unsaved data would be
lost. Microsoft made
patches to prevent the WinNuke attack, but the OOB packets.
(Default: Disabled)
Summary of Contents for GEL-5261
Page 14: ...14 Contents Glossary 551 Index 559...
Page 26: ...26 Figures...
Page 30: ...30 Section I Getting Started...
Page 42: ...42 Section II Web Configuration IP Services on page 527...
Page 45: ...Chapter 2 Using the Web Interface NavigatingtheWebBrowserInterface 45 Figure 1 Dashboard...
Page 62: ...62 Chapter 2 Using the Web Interface NavigatingtheWebBrowserInterface...
Page 180: ...Chapter 6 Address Table Settings Issuing MAC Address Traps 180...
Page 208: ...Chapter 8 Congestion Control Storm Control 208 Figure 121 Configuring Storm Control...
Page 228: ...228 Chapter 10 Quality of Service Attaching a Policy Map to a Port...
Page 332: ...Chapter 12 Security Measures ARP Inspection 332 Figure 207 Displaying the ARP Inspection Log...
Page 436: ...Chapter 13 Basic Administration Protocols LBD Configuration 436...
Page 488: ...488 Chapter 14 Multicast Filtering Filtering MLD Query Packets on an Interface...
Page 498: ...Chapter 15 IP Tools Address Resolution Protocol 498...
Page 517: ...517 Chapter 16 IP Configuration Setting the Switch s IP Address IP Version 6 interface...
Page 542: ...540 Section III Appendices...
Page 560: ...Glossary 558...
Page 570: ...568 Index E062017 ST R01...