09.12.2012 Views

Understanding the network.pdf - Back to Home

Understanding the network.pdf - Back to Home

Understanding the network.pdf - Back to Home

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

http://www.cert.org/<br />

http://www.rootshell.com/<br />

http://www.phrack.com/<br />

SMURF attacks use IP-directed broadcasts <strong>to</strong> overload <strong>the</strong> <strong>network</strong> segment.<br />

Usually, an ICMP message (like a ping) or IP datagram with <strong>the</strong> <strong>network</strong>'s broadcast<br />

address as <strong>the</strong> destination address (and a forged or bogus source address) is sent <strong>to</strong><br />

every host on <strong>the</strong> segment, which forces all <strong>the</strong> recipient hosts <strong>to</strong> respond. A<br />

continuous flood of <strong>the</strong>se packets will effectively "melt" <strong>the</strong> segment, allowing no<br />

real traffic <strong>to</strong> be passed. These attacks can be prevented by denying ICMP echo<br />

replies as part of your inbound security filter:<br />

access-list 106 deny icmp any any echo-reply<br />

access-list 106 permit icmp any any<br />

In addition, by disabling <strong>the</strong> router interface's capability <strong>to</strong> forward IP-directed<br />

broadcasts, you can prevent <strong>the</strong> propagation of such traffic. This is accomplished<br />

with <strong>the</strong> interface configuration subcommand .<br />

AppleTalk Access-Lists<br />

ACL filtering for AppleTalk is primarily oriented <strong>to</strong>ward <strong>the</strong> restriction of user access<br />

<strong>to</strong> <strong>network</strong> resources. AppleTalk ACLs make it possible <strong>to</strong> restrict access <strong>to</strong> nodes,<br />

printers, file servers, <strong>network</strong>s (all or part of a cable-range), and zones. This<br />

flexibility provides administra<strong>to</strong>rs with a great deal of control over what resources<br />

are accessible <strong>to</strong> users, zones, and <strong>network</strong>s. You might want <strong>to</strong> restrict this kind of<br />

traffic on your <strong>network</strong> because it's chatty; it takes up a lot of bandwidth, relatively<br />

speaking. AppleTalk <strong>network</strong> traffic filtering is more complex than IP traffic filtering<br />

due <strong>to</strong> AppleTalk's use of dynamic addressing and its logical naming scheme.<br />

AppleTalk ACLs are built using a variety of matching criteria, which are listed in<br />

Table 9.5.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!