Filter and Firewall
Left running head: 
Chapter name (automatic)
746
Beta Beta
OmniAccess 5740 Unified Services Gateway CLI Configuration Guide
Alcatel-Lucent
TCP-XMAS-SCAN 
tcp-xmas-scan 
This frame should never be seen in normal TCP operation. Sometimes this is 
done in preparation for a future attack, or sometimes it is done to see if the system 
has a service which is susceptible to attack. A TCP frame has been seen with a 
sequence number of zero and the FIN, URG, and PUSH bits all set. To avoid this 
attack the above command is placed in the default DoS prevention list.
UDP-FRAGGLE-ATTACK
udp-fraggle-attack 
When a perpetrator sends a large number of UDP echo (ping) traffic at IP 
broadcast addresses, all of it having a fake source address, it causes system 
crash or denial of service. This command is implicitly included in the default attack 
prevention list to secure the system from this attack.
OPTIONAL ATTACKS 
The following four DoS attacks are not set for prevention by default. These attacks
too can be either manually turned on for detection or filters can be applied to block
them.
ICMP-BLOCK-TRACE-ROUTE
icmp-block-trace-route
This command is not a default DoS setting. This attack is not set for protection by 
default in the OmniAccess 5740 USG, but you can turn it on by explicitly adding 
the above keyword in the user-defined attack prevention list. 
ICMP-ROUTER-ADVERTISEMENT
icmp-router-advertisement
Remote attackers can spoof these ICMP packets and remotely add bad default-
route entries into a victims routing table. Since the victim's system would be 
forwarding the frames to the wrong address, it will be unable to reach other 
networks. This attack can be prevented by adding this command in the DoS 
prevention list.
ICMP-REDIRECT
icmp-redirect
This command is not a default DoS setting. The above command can be included 
in the DoS prevention list to avoid this kind of attacks.