Smurf Attacks, Directed Broadcasts, and RPF Checks

A smurf attack occurs when a host sends a large number of ICMP Echo Requests with some atypical IP addresses in the packet. The destination address is a subnet broadcast address, also known as a directed broadcast address. Routers forward these packets based on normal matching of the IP routing tabl...

Modern Internet Architecture

For some time, the FCC has been encouraging the telephony industry, through legislation, to allow competition in both the long-distance and local-area markets. The Internet is already there without legislation, but certainly has used the help of government policy through the NSF. From a technologica...

NIDS

NIDS hardening is usually very straightforward. NIDS generally don't support any ancillary services, so they are fairly easy to secure. The primary hardening task is to ensure that the detection interface is not reachable at L3 and that the management interface connects directly back to a trusted lo...

Using Committed Access Rate

Committed Access Rate (CAR) provides a useful method for policing the traffic rate through an interface. The main features of CAR are functionally similar to traffic shaping, but it also allows several extremely useful extensions. This first example shows the simplest application. We have configured...

Viewing EIGRP Status

The precise output of the show ip protocols command varies, depending on what features are enabled. However, we have shown several examples of different output throughout this chapter: Router1#show ip protocols Routing Protocol is "eigrp 55"   Outgoing update filter list for a...

Contact Us

86-136-2222-6316
CALL ME NOW

© 2011 CathaySchool, an ANDA Technology Group company, All Rights Reserved Privacy Policy | Refund Policy | Disclaimer | Sitemap | Resources Tags