D-Link DXS-3400 User Manual - Page 378
Security >DoS Attack Prevention Settings, SNMP Server Enable Traps DoS Settings
View all D-Link DXS-3400 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 378 highlights
DXS-3400 Series Lite Layer 3 Stackable 10GbE Managed Switch Web UI Reference Guide ping larger than the maximum IP packet size which is 65535 bytes). The sending of a ping of this size can crash the target computer. Traditionally, this bug has been relatively easy to exploit. Generally, sending a 65536 byte ping packet is illegal according to networking protocol, but a packet of such a size can be sent if it is fragmented; when the target computer reassembles the packet, a buffer overflow can occur, which often causes a system crash. • TCP Tiny Fragment Attack: The Tiny TCP Fragment attacker uses IP fragmentation to create extremely small fragments and force the TCP header information into a separate packet fragment to pass through the check function of the router and issue an attack. • All Types: All of above types. To view the following window, click Security >DoS Attack Prevention Settings, as shown below: Figure 9-87DoS Attack Prevention Settings Window The fields that can be configured in SNMP Server Enable Traps DoS Settingsare described below: Parameter Trap State Description Select to enable or disable the DoS attack prevention trap state here. Click the Apply button to accept the changes made. The fields that can be configured in DoS Attack Prevention Settingsare described below: Parameter DoS Type Selection State Action Description Tick the DoS type option that will be prevented here. Select to enable or disable the DoS attack prevention feature's global state here. Select the action that will be taken when the DoS attack was detected here. The only option to select here is Drop. Click the Apply button to accept the changes made. 368