O'Reilly logo

CCIE Security v4.0 Quick Reference, Third Edition by Umesh Lakshman, Lancy Lobo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 4. Threats, Vulnerability Analysis, and Mitigation

Recognize and Mitigate Common Attacks

Unauthorized network access or attacks can cause damage or destruction to proprietary data, negatively affecting company productivity and the capability to compete. These sections highlight the various common attack scenarios and identify methods for mitigating those attacks or unauthorized network access.

ICMP Attacks and PING Floods

ICMP or PING flood attacks are aimed at network devices with an intention to overwhelm them with attack traffic and thereby slow down legitimate movement. The attacker typically is on a higher bandwidth network compared to the target device and sends continuous ICMP Echo Request (PING) packets toward the target. The ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required