Hello friends, tell me which protocol should be disabled on a critical network device such as a router?
suresh 04-October-2007 05:30:41 PM

Comments


www.cisco.com/en/US/docs/solutions/Enterprise/Security/Baseline_Security/sec_chap2.html
Posted by crouse


www.avaya.com/master-usa/en-us/resource/assets/applicationnotes/config-c360.pdf
Posted by crouse


Internet Control Message Protocol is a reporting protocol used by
utilities such as ping and trace route to acknowledge network activity
from a device. Unfortunately, this protocol can also be used as a basis
for DoS attacks, such as a ping flood to prevent the device from
acknowledging legitimate requests. Such utilities are also used by an
intruder to discover which hosts exist on the network
Posted by crouse


Internet Control Message Protocol is a reporting protocol used by
utilities such as ping and trace route to acknowledge network activity
from a device. Unfortunately, this protocol can also be used as a basis
for DoS attacks, such as a ping flood to prevent the device from
acknowledging legitimate requests. Such utilities are also used by an
intruder to discover which hosts exist on the network.

Posted by suresh123



Posted: 04-October-2007 05:33:26 PM By: suresh123

Internet Control Message Protocol is a reporting protocol used by
utilities such as ping and trace route to acknowledge network activity
from a device. Unfortunately, this protocol can also be used as a basis
for DoS attacks, such as a ping flood to prevent the device from
acknowledging legitimate requests. Such utilities are also used by an
intruder to discover which hosts exist on the network.

Posted: 05-February-2009 06:07:48 AM By: crouse

Internet Control Message Protocol is a reporting protocol used by
utilities such as ping and trace route to acknowledge network activity
from a device. Unfortunately, this protocol can also be used as a basis
for DoS attacks, such as a ping flood to prevent the device from
acknowledging legitimate requests. Such utilities are also used by an
intruder to discover which hosts exist on the network

Posted: 14-June-2009 11:24:14 AM By: crouse

www.avaya.com/master-usa/en-us/resource/assets/applicationnotes/config-c360.pdf

Posted: 14-June-2009 11:28:16 AM By: crouse

www.cisco.com/en/US/docs/solutions/Enterprise/Security/Baseline_Security/sec_chap2.html