Personal Stateful Firewall Overview  
▄ Cisco ASR 5000 Series Product Overview 
  Land attacks 
  Jolt attacks 
  Teardrop attacks — Detected only in downlink direction, i.e. traffic coming from the external network 
towards the mobile subscribers 
  Invalid IP option length 
  IP-unaligned-timestamp attack — Detected only in downlink direction 
  Short IP header length 
  IP checksum errors 
  IP reassembly failure (downlink) 
  IP reassembly failure (uplink) 
  Source router — Detected only in downlink direction 
  TCP-based Attacks: 
  Data packets received after RST/FIN 
  Invalid SEQ number received with RST 
  Data without connection established 
  Invalid TCP connection requests 
  Invalid TCP pre-connection requests 
  Invalid ACK value (cookie enabled) 
  Invalid TCP packet length 
  Short TCP header length 
  TCP checksum errors 
  SEQ/ACK out-of-range 
  TCP null scan attacks 
  Post connection SYN 
  No TCP flags set 
  All TCP flags set 
  Invalid TCP packets 
  Flows closed by RST before 3-Way handshake 
  Flows timed-out in SYN_RCVD1 state 
  Flows timed-out in SYN_RCVD2 state 
  TCP-SYN flood attacks — Detected only in downlink direction 
  FTP bounce attack — Detected only in downlink direction 
  MIME flood attacks — Detected only in downlink direction 
  Exceeding reset message threshold 
  Source port zero 
  WinNuke attack — Detected only in downlink direction 
  TCP-window-containment — Detected only in downlink direction