udp-fraggle-attack
Except on the first page, right running head:
Heading1 or Heading1NewPage text (automatic)
739
Alcatel-Lucent
Beta Beta
OmniAccess 5740 Unified Services Gateway CLI Command Reference Guide
UDP-FRAGGLE-ATTACK
udp-fraggle-attack
DESCRIPTION
This command is entered in the Firewall-Attack Sub Configuration Mode. When a
perpetrator sends a large number of UDP echo (ping) traffic at IP broadcast
addresses, all of it having a fake source address, it causes system crash or denial
of service. The above command is included in the default attack prevention list to
secure the system from this attack.
PARAMETERS
None.
EXAMPLE
ALU(config-firewall-attack-A1)# udp-fraggle-attack
UDP-PORT-LOOPBACK
udp-port-loopback [threshold <1-4294967295> <1-4294967295>]
DESCRIPTION
This command is entered in the Firewall-Attack Sub Configuration Mode.
A UDP packet travels between two "echoing" ports. Such packets can bounce
infinite number of times, using up network bandwidth and CPU. An intruder can
cause problems by spoofing a packet from one machine and send it to
another.The malicious intruder could generate lots of these packets in order to
totally overwhelm the systems and network. This keyword is included with
appropriate parameters in the default list.
PARAMETERS
DEFAULT VALUE
The default is 10 packets in 1000ms.
EXAMPLE
ALU(config)# attack A4
ALU(config-attack A4)# udp-port-loopback threshold 30 13
Parameter Description
threshold Threshold limit set.
<1-4294967295> <1-4294967295> Number of packets permissible within a
defined interval.