EasyManuals Logo

Alcatel-Lucent OmniAccess 5740 Cli Command Reference Guide

Alcatel-Lucent OmniAccess 5740
1043 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #746 background imageLoading...
Page #746 background image
default
Except on the first page, right running head:
Heading1 or Heading1NewPage text (automatic)
711
Alcatel-Lucent
Beta Beta
OmniAccess 5740 Unified Services Gateway CLI Command Reference Guide
ip-land-attack - -
tcp-xmas-scan - -
tcp_-invalid-urgent-offset - -
tcp-null-scan - -
tcp-syn-fin - -
tcp-fin-no-ack - -
udp-fraggle-attack - -
You can create a “defaultattack setting to check only the stateless attacks by
using the keyword “default stateless”.
The following attacks are the Default Stateless (Default Non-Rate Limiting)
attacks:
ip-tear-drop - -
ip-tiny-frag 50 64
icmp-ping-of-death 50 65507
ip-zero-length - -
icmp-smurf-attack - -
ip-land-attack - -
tcp-xmas-scan - -
tcp_-invalid-urgent-offset - -
tcp-null-scan - -
tcp-syn-fin - -
tcp-fin-no-ack - -
udp-fraggle-attack - -
Note: Some of the fragmentation attacks, in particular teardrop attack, tiny fragment attack,
and TCP header fragment attacks are detected by the fragment handling code even if
the corresponding attacks have not been configured. This will happen for any traffic
that is subject to any firewall configuration, i.e., either filter, NAT or DoS configuration.
This is why you can see these attacks in the “show” output even when he has not
configured them.

Table of Contents

Other manuals for Alcatel-Lucent OmniAccess 5740

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Alcatel-Lucent OmniAccess 5740 and is the answer not in the manual?

Alcatel-Lucent OmniAccess 5740 Specifications

General IconGeneral
BrandAlcatel-Lucent
ModelOmniAccess 5740
CategoryGateway
LanguageEnglish

Related product manuals