Cisco Systems ASA 5505 Webcam User Manual


 
28-9
Cisco ASA Series Firewall ASDM Configuration Guide
Chapter 28 Using Protection Tools
Configuring IP Audit for Basic IPS Support
2150 400023 Fragmented ICMP Traffic Attack Triggers when a IP datagram is received with
the protocol field of the IP header set to 1
(ICMP) and either the more fragments flag is
set to 1 (ICMP) or there is an offset indicated
in the offset field.
2151 400024 Large ICMP Traffic Attack Triggers when a IP datagram is received with
the protocol field of the IP header set to
1(ICMP) and the IP length > 1024.
2154 400025 Ping of Death Attack Attack Triggers when a IP datagram is received with
the protocol field of the IP header set to
1(ICMP), the Last Fragment bit is set, and (IP
offset * 8) + (IP data length) > 65535 that is
to say, the IP offset (which represents the
starting position of this fragment in the
original packet, and which is in 8 byte units)
plus the rest of the packet is greater than the
maximum size for an IP packet.
3040 400026 TCP NULL flags Attack Triggers when a single TCP packet with none
of the SYN, FIN, ACK, or RST flags set has
been sent to a specific host.
3041 400027 TCP SYN+FIN flags Attack Triggers when a single TCP packet with the
SYN and FIN flags are set and is sent to a
specific host.
3042 400028 TCP FIN only flags Attack Triggers when a single orphaned TCP FIN
packet is sent to a privileged port (having port
number less than 1024) on a specific host.
3153 400029 FTP Improper Address Specified Informational Triggers if a port command is issued with an
address that is not the same as the requesting
host.
3154 400030 FTP Improper Port Specified Informational Triggers if a port command is issued with a
data port specified that is <1024 or >65535.
4050 400031 UDP Bomb attack Attack Triggers when the UDP length specified is
less than the IP length specified. This
malformed packet type is associated with a
denial of service attempt.
4051 400032 UDP Snork attack Attack Triggers when a UDP packet with a source
port of either 135, 7, or 19 and a destination
port of 135 is detected.
4052 400033 UDP Chargen DoS attack Attack This signature triggers when a UDP packet is
detected with a source port of 7 and a
destination port of 19.
6050 400034 DNS HINFO Request Informational Triggers on an attempt to access HINFO
records from a DNS server.
Table 28-1 Signature IDs and System Message Numbers (continued)
Signature
ID
Message
Number Signature Title Signature Type Description