default
Except on the first page, right running head:
Heading1 or Heading1NewPage text (automatic)
711
Alcatel-Lucent
Beta Beta
OmniAccess 5740 Unified Services Gateway CLI Command Reference Guide
ip-land-attack - -
tcp-xmas-scan - -
tcp_-invalid-urgent-offset - -
tcp-null-scan - -
tcp-syn-fin - -
tcp-fin-no-ack - -
udp-fraggle-attack - -
You can create a “default” attack setting to check only the stateless attacks by
using the keyword “default stateless”.
The following attacks are the Default Stateless (Default Non-Rate Limiting)
attacks:
ip-tear-drop - -
ip-tiny-frag 50 64
icmp-ping-of-death 50 65507
ip-zero-length - -
icmp-smurf-attack - -
ip-land-attack - -
tcp-xmas-scan - -
tcp_-invalid-urgent-offset - -
tcp-null-scan - -
tcp-syn-fin - -
tcp-fin-no-ack - -
udp-fraggle-attack - -
Note: Some of the fragmentation attacks, in particular teardrop attack, tiny fragment attack,
and TCP header fragment attacks are detected by the fragment handling code even if
the corresponding attacks have not been configured. This will happen for any traffic
that is subject to any firewall configuration, i.e., either filter, NAT or DoS configuration.
This is why you can see these attacks in the “show” output even when he has not
configured them.