Chapter 12
| Security Measures
DoS Protection
– 355 –
◆
Smurf Attack
– Attacks in which a perpetrator generates a large amount of
spoofed ICMP Echo Request traffic to the broadcast destination IP address
(255.255.255.255), all of which uses a spoofed source address of the intended
victim. The victim should crash due to the many interrupts required to send
ICMP Echo response packets. (Default: Enabled)
◆
TCP Flooding Attack
– Attacks in which a perpetrator sends a succession of
TCP SYN requests (with or without a spoofed-Source IP) to a target and never
returns ACK packets. These half-open connections will bind resources on the
target, and no new connections can be made, resulting in a denial of service.
(Default: Disabled)
◆
TCP Flooding Attack Rate
– Maximum allowed rate. (Range: 64-2000 kbits/
second; Default: 1000 kbits/second)
◆
TCP Null Scan
– A TCP NULL scan message is used to identify listening TCP
ports. The scan uses a series of strangely configured TCP packets which contain
a sequence number of 0 and no flags. If the target's TCP port is closed, the
target replies with a TCP RST (reset) packet. If the target TCP port is open, it
simply discards the TCP NULL scan. (Default: Enabled)
◆
TCP-SYN/FIN Scan
– A TCP SYN/FIN scan message is used to identify listening
TCP ports. The scan uses a series of strangely configured TCP packets which
contain SYN (synchronize) and FIN (finish) flags. If the target's TCP port is
closed, the target replies with a TCP RST (reset) packet. If the target TCP port is
open, it simply discards the TCP SYN FIN scan. (Default: Enabled)
◆
TCP Xmas Scan
– A so-called TCP XMAS scan message is used to identify
listening TCP ports. This scan uses a series of strangely configured TCP packets
which contain a sequence number of 0 and the URG, PSH and FIN flags. If the
target's TCP port is closed, the target replies with a TCP RST packet. If the target
TCP port is open, it simply discards the TCP XMAS scan. (Default: Enabled)
◆
TCP/UDP Packets with Port 0
– Protects against DoS attacks in which the TCP
or UDP source port or destination port is set to zero. This technique may be
used as a form of DoS attack, or it may just indicate a problem with the source
device. When this command is enabled, the switch will drop these packets.
(Default: Enabled)
Note:
Due to a chip limitation, this command does not work when the TCP source
port/destiation port or UDP source port/destiation port are both set to zero.
◆
UDP Flooding Attack
– Attacks in which a perpetrator sends a large number of
UDP packets (with or without a spoofed-Source IP) to random ports on a
remote host. The target will determine that application is listening at that port,
and reply with an ICMP Destination Unreachable packet. It will be forced to
send many ICMP packets, eventually leading it to be unreachable by other
clients. (Default: Disabled)
Summary of Contents for GTL-2881
Page 34: ...Section I Getting Started 34 ...
Page 48: ...Section II Web Configuration 48 Unicast Routing on page 651 ...
Page 151: ...Chapter 4 Interface Configuration VLAN Trunking 151 Figure 69 Configuring VLAN Trunking ...
Page 152: ...Chapter 4 Interface Configuration VLAN Trunking 152 ...
Page 230: ...Chapter 8 Congestion Control Automatic Traffic Control 230 ...
Page 596: ...Chapter 14 Multicast Filtering Multicast VLAN Registration for IPv6 596 ...
Page 620: ...Chapter 15 IP Configuration Setting the Switch s IP Address IP Version 6 620 ...
Page 672: ...Section III Appendices 672 ...
Page 678: ...Appendix A Software Specifications Management Information Bases 678 ...
Page 688: ...Appendix C License Statement GPL Code Statement Notification of Compliance 688 ...
Page 696: ...Glossary 696 ...
Page 706: ...GTL 2881 GTL 2882 E112016 ST R01 ...