Publication Cover
EDPACS
The EDP Audit, Control, and Security Newsletter
Volume 29, 2002 - Issue 12
9
Views
0
CrossRef citations to date
0
Altmetric
Original Articles

Configuring Cisco Denial-of-Service Security Features, Part 1

 

Abstract

You are watching the World Series and Matt Williams of the Diamondbacks is at bat. The count is 3 and 2, two out, and the bases are loaded. The phone rings and the ring indicates a long-distance call. Obviously, the caller is not watching the game. You answer the phone, only to find no one there. You curse and slam down the phone. Several seconds later, it hap-pens again. You repeat the process. This series of events occurs several more times until, out of frustration, you turn off the ringer and let all the calls go to voicemail. At work the next morning, your buddy says, “Where were you? I tried to call last night to make sure you were watching the game.” (If you are a Canadian, substitute Stanley Cup finals for World Series, Mats Sundin for Matt Williams, and Toronto Maple Leafs for Diamondbacks, etc. If you live anywhere else, sub-stitute World Cup, Reynaldo, etc.) The point is that the unknown caller was tying up your phone line and denying access to you. It got so bad you had to take your phone off-line. You can see that it is very difficult to protect against this type of attack, save going off-line. Well, you could take this story and create a simple analogy using your router. Someone starts flooding your router or network with dubious packets. The packets cause the system to crash or consume all avail-able resources. Your legitimate clients cannot get through or do anything. When someone hits your router with a denial-of-service attack, he or she holds up critical resources by block-ing the door to lawful business activity. A denial-of-service (DoS) attack is an attack against your network availability.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.