Re: Smurf Attack

From: Edouard Zorrilla (ezorrilla@tsf.com.pe)
Date: Mon Mar 12 2007 - 08:50:08 ART


One way could be:

Rack1R2#sh access-lists
Extended IP access list SMURF-ATTACk
    10 permit icmp any 0.0.0.0 255.255.255.0 echo log-input
    20 permit icmp any 0.0.0.255 255.255.255.0 echo log-input
    30 permit icmp any any echo-reply log-input
    40 permit ip any any
Rack1R2#

Regards

----- Original Message -----
From: <huangyinxiao@gmail.com>
To: <ccielab@groupstudy.com>
Sent: Monday, March 12, 2007 3:19 AM
Subject: Smurf Attack

> Dear all,
>
> How can I define a smurf attack using ip access list?
>
> Regards,
>
> Laurence
>
> _______________________________________________________________________
> Subscription information may be found at:
> http://www.groupstudy.com/list/CCIELab.html



This archive was generated by hypermail 2.1.4 : Sun Apr 01 2007 - 06:35:51 ART