Table 60: Attack Counters
(continued)
Description
Item
Also called an address sweep attack, an IP sweep is similar to a port scan
attack. It occurs when an attacker sends ICMP echo requests (or pings) to
different destination addresses hoping that one will reply, thus uncovering
an address to a target. If a remote host pings 10 addresses in 0.3 seconds,
the security device flags this as an address sweep attack and drops the
connection.
IP Sweep
Malicious Java or ActiveX components can be hidden in Web pages. When
downloaded, these applets install a Trojan horse on your computer. Similarly,
Trojan horses can be hidden in compressed files such as .zip, .gzip, .tar, and
executable (.exe) files.
Block Java/ActX
A SYN fragment attack floods the target host with SYN packet fragments.
The host catches the fragments, waiting for the remaining packets to arrive
so it can reassemble them. When a server or host is flooded with connections
that cannot be completed, the host's memory buffer eventually fills. No
further connections are possible, and damage to the host's operating system
can occur. The security device drops ICMP packets when the protocol field
indicates ICMP packets, and the fragment flag is set to 1 or an offset is
indicated.
SYN Frag
TCP packet that does not have any bits set in the flags.
TCP no Flag
The security device drops packets where the protocol field is set to 101 or
greater. These protocol types are reserved and undefined at this time.
Unknown Prot
Triggered when the list of IP options in the IP datagram header is incomplete
or malformed.
Bad IP Opt
The security device blocks packets where the IP option is 7 (Record Route).
This option is used to record the route of a packet. A recorded route is
composed of a series of Internet addresses, which an outsider can analyze
to learn details about your network's addressing scheme and topology.
IP Rec Route
The security device blocks packets where the IP option list includes option
4 (Internet Timestamp).
IP Timestamp
This option provides a way for hosts to send security, compartmentation,
TCC (closed user group) parameters, and Handling Restriction Codes
compatible with DOD requirements.
IP Security
The security device blocks packets where the IP option is 3 (Loose Source
Routing). This option provides a means for the source of a packet to supply
routing information to be used by the gateways in forwarding the packet to
the destination. This option is a loose source route because the gateway or
host IP is allowed to use any route of any number of other intermediate
gateways to reach the next address in the route.
IP Loose Src
669
Copyright © 2010, Juniper Networks, Inc.
Chapter 17: Realtime Monitoring
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...