TP-Link T1600G-18TSTL-SG2216 T1600G-18TSUN V1 CLI Reference Guide Guide - Page 109

ip dos-prevent type For other switches

Page 109 highlights

System bugs, which will cause the host with a blue screen. smurf -- The attacker broadcasts large numbers of Internet Control Message Protocol (ICMP) packets with the intended victim's spoofed source IP to a computer network using an IP broadcast address. Most devices on a network will respond to this by sending a reply to the source IP address. If the number of devices on the network that receive and respond to these packets is very large, the victim's host will be flooded with traffic, which can slow down the victim's host and cause the host impossible to work on. ping-of-death -- The attacker sends an improperly large Internet Control Message Protocol (ICMP) echo request packet, or a ping packet, with the purpose of overflowing the input buffers of the destination host and causing the host to crash. Command Mode Global Configuration Mode Privilege Requirement Only Admin, Operator and Power User level users have access to these commands. Example Enable the DoS Defend Type named Land attack: T1600G-18TS(config)#ip dos-prevent type land 13.3 ip dos-prevent type (For other switches) Description The ip dos-prevent type command is used to select the DoS Defend Type. To disable the corresponding Defend Type, please use no ip dos-prevent type command. Syntax ip dos-prevent type { land | scan-synfin | xma-scan | null-scan | port-less-1024 | blat | ping-flood | syn-flood | win-nuke } no ip dos-prevent type { land | scan-synfin | xma-scan | null-scan | port-less-1024 | blat | ping-flood | syn-flood | win-nuke } Parameter land --The attacker sends a specific fake SYN (synchronous) packet to the destination host. Because both of the source IP address and the destination 92

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375

System bugs, which will cause the host with a blue screen.
smurf —— The attacker broadcasts large numbers of Internet Control
Message Protocol (ICMP) packets with the intended victim’s spoofed source
IP to a computer network using an IP broadcast address. Most devices on a
network will respond to this by sending a reply to the source IP address. If the
number of devices on the network that receive and respond to these packets
is very large, the victim’s host will be flooded with traffic, which can slow down
the victim’s host and cause the host impossible to work on.
ping-of-death —— The attacker sends an improperly large Internet Control
Message Protocol (ICMP) echo request packet, or a ping packet, with the
purpose of overflowing the input buffers of the destination host and causing
the host to crash.
Command Mode
Global Configuration Mode
Privilege Requirement
Only Admin, Operator and Power User level users have access to these
commands.
Example
Enable the DoS Defend Type named Land attack:
T1600G-18TS(config)#ip dos-prevent type
land
13.3
ip dos-prevent type (For other switches)
Description
The
ip dos-prevent type
command is used to select the DoS Defend Type.
To disable the corresponding Defend Type, please use
no ip dos-prevent
type
command.
Syntax
ip
dos-prevent
type
{
land
|
scan-synfin
|
xma-scan
|
null-scan
|
port-less-1024 | blat | ping-flood | syn-flood | win-nuke }
no ip dos-prevent type
{ land | scan-synfin | xma-scan | null-scan |
port-less-1024 | blat | ping-flood | syn-flood | win-nuke }
Parameter
land ——The attacker sends a specific fake SYN (synchronous) packet to the
destination host. Because both of the source IP address and the destination
92