Hello friends, tell me which protocol should be disabled on a critical network device such as a router? suresh 04-October-2007 05:30:41 PMComments www.cisco.com/en/US/docs/solutions/Enterprise/Security/Baseline_Security/sec_chap2.html Posted by crouse www.avaya.com/master-usa/en-us/resource/assets/applicationnotes/config-c360.pdf Posted by crouse Internet Control Message Protocol is a reporting protocol used by utilities such as ping and trace route to acknowledge network activity from a device. Unfortunately, this protocol can also be used as a basis for DoS attacks, such as a ping flood to prevent the device from acknowledging legitimate requests. Such utilities are also used by an intruder to discover which hosts exist on the network Posted by crouse Internet Control Message Protocol is a reporting protocol used by utilities such as ping and trace route to acknowledge network activity from a device. Unfortunately, this protocol can also be used as a basis for DoS attacks, such as a ping flood to prevent the device from acknowledging legitimate requests. Such utilities are also used by an intruder to discover which hosts exist on the network. Posted by suresh123 |
Posted: 04-October-2007 05:33:26 PM By: suresh123 Internet Control Message Protocol is a reporting protocol used by utilities such as ping and trace route to acknowledge network activity from a device. Unfortunately, this protocol can also be used as a basis for DoS attacks, such as a ping flood to prevent the device from acknowledging legitimate requests. Such utilities are also used by an intruder to discover which hosts exist on the network. | |
Posted: 05-February-2009 06:07:48 AM By: crouse Internet Control Message Protocol is a reporting protocol used by utilities such as ping and trace route to acknowledge network activity from a device. Unfortunately, this protocol can also be used as a basis for DoS attacks, such as a ping flood to prevent the device from acknowledging legitimate requests. Such utilities are also used by an intruder to discover which hosts exist on the network | |
Posted: 14-June-2009 11:24:14 AM By: crouse www.avaya.com/master-usa/en-us/resource/assets/applicationnotes/config-c360.pdf | |
Posted: 14-June-2009 11:28:16 AM By: crouse www.cisco.com/en/US/docs/solutions/Enterprise/Security/Baseline_Security/sec_chap2.html |