SMARTLINK
I&II
MDS921AE-10BTS - MDS
UDP Flood: A sender transmits a volume of requests for UDP diagnostic services which cause all
CPU resources to be consumed serving the phony requests.
A ping of death attack attempts to crash your system by sending a fragmented packet,
reconstructed is larger than the maximum allowable size. Other known variants of the ping of death
include teardrop, bonk and nestea.
A land attack is an attempt to slow your network down by sending a packet with identical source
and destination addresses originating from your network.
IP Spoofing is a method of masking the identity of an intrusion by making it appeared that the traffic
came from a different computer. This is used by intruders to keep their anonymity and can be used
in a Denial of Service attack.
A smurf attack involves two systems. The attacker sends a packet containing a ICMP echo request
(ping) to the network address of one system. This system is known as the amplifier. The return
address of the ping has been faked (spoofed) to ap
network (the victim). The victim is then flooded with responses to the ping. As many responses are
generated for only one attack, the attacker is able use many amplifiers on the same victim.
IP_qos
IP QoS is a function to decide the priorities of setting IPs to transfer packets under the situation of
overloading bandwidth.
To configure IP QoS function, move the cursor to IPQoS and press enter.
>> Active
Trigger IP QoS function
Add
Add IP QoS
Delete
Delete IP QoS policy
Modify
Modify IP QoS policy
list
Show IP QoS policy table
You can enable the IPQoS function via
The add parameters of IPQoS can be configured via
>> Protocol
Configure protocol
local_ip
Configure local IP parameter
remote_ip
Configure remote IP parameter
Port
Configure port parameter
description Policy description
Enable
Enable the policy
Precedence
Configure precedence parameter
S957AE-10BTS User Manual
Page 111 of 113
UDP Flood: A sender transmits a volume of requests for UDP diagnostic services which cause all
CPU resources to be consumed serving the phony requests.
A ping of death attack attempts to crash your system by sending a fragmented packet,
reconstructed is larger than the maximum allowable size. Other known variants of the ping of death
include teardrop, bonk and nestea.
A land attack is an attempt to slow your network down by sending a packet with identical source
esses originating from your network.
IP Spoofing is a method of masking the identity of an intrusion by making it appeared that the traffic
came from a different computer. This is used by intruders to keep their anonymity and can be used
rvice attack.
A smurf attack involves two systems. The attacker sends a packet containing a ICMP echo request
(ping) to the network address of one system. This system is known as the amplifier. The return
address of the ping has been faked (spoofed) to appear to come from a machine on another
network (the victim). The victim is then flooded with responses to the ping. As many responses are
generated for only one attack, the attacker is able use many amplifiers on the same victim.
IP QoS is a function to decide the priorities of setting IPs to transfer packets under the situation of
To configure IP QoS function, move the cursor to IPQoS and press enter.
Trigger IP QoS function
Add IP QoS policy
Delete IP QoS policy
Modify IP QoS policy
Show IP QoS policy table
You can enable the IPQoS function via
active
command.
The add parameters of IPQoS can be configured via
add
command
Configure protocol
Configure local IP parameter
Configure remote IP parameter
Configure port parameter
Policy description
Enable the policy
Configure precedence parameter
UDP Flood: A sender transmits a volume of requests for UDP diagnostic services which cause all
A ping of death attack attempts to crash your system by sending a fragmented packet, when
reconstructed is larger than the maximum allowable size. Other known variants of the ping of death
A land attack is an attempt to slow your network down by sending a packet with identical source
IP Spoofing is a method of masking the identity of an intrusion by making it appeared that the traffic
came from a different computer. This is used by intruders to keep their anonymity and can be used
A smurf attack involves two systems. The attacker sends a packet containing a ICMP echo request
(ping) to the network address of one system. This system is known as the amplifier. The return
pear to come from a machine on another
network (the victim). The victim is then flooded with responses to the ping. As many responses are
generated for only one attack, the attacker is able use many amplifiers on the same victim.
IP QoS is a function to decide the priorities of setting IPs to transfer packets under the situation of