default
Except on the first page, right running head:  
Heading1 or Heading1NewPage text (automatic)
711
Alcatel-Lucent
Beta Beta
OmniAccess 5740 Unified Services Gateway CLI Command Reference Guide
ip-land-attack                  -    -
tcp-xmas-scan                   -    -
tcp_-invalid-urgent-offset      -    -
tcp-null-scan                   -    -
tcp-syn-fin                     -    -
tcp-fin-no-ack                  -    -
udp-fraggle-attack              -    -
You can create a “default” attack setting to check only the stateless attacks by 
using the keyword “default stateless”.
The following attacks are the Default Stateless (Default Non-Rate Limiting) 
attacks:
ip-tear-drop                    -    - 
ip-tiny-frag                    50   64
icmp-ping-of-death              50   65507
ip-zero-length                  -    -
icmp-smurf-attack               -    -
ip-land-attack                  -    -
tcp-xmas-scan                   -    -
tcp_-invalid-urgent-offset      -    -
tcp-null-scan                   -    -
tcp-syn-fin                     -    -
tcp-fin-no-ack                  -    -
udp-fraggle-attack              -    -
Note: Some of the fragmentation attacks, in particular teardrop attack, tiny fragment attack, 
and TCP header fragment attacks are detected by the fragment handling code even if 
the corresponding attacks have not been configured. This will happen for any traffic 
that is subject to any firewall configuration, i.e., either filter, NAT or DoS configuration. 
This is why you can see these attacks in the “show” output even when he has not 
configured them.