>Perhaps to try to catch a hacker? Sending numerous IP fragments is a known
>hacker technique. It can result in a denial of service because the host
>doing the reassembling has to gather up the fragments and wait for them to
>complete, which can cause buffer overruns and excess CPU usage. A hacker
>could ping (or whatever) your router (or devices behind the router) with
>fragments in an attempt to cause the recipient to slow down and possibly
>stop doing its job.
>
>You would only want to have this filter on for a short time and use it for
>logging purposes. Having it on indefinitely would make matters even worse.
>
>Other than that, I can't think of a use for such an ACL.
>
>Priscilla
>
>At 07:18 AM 1/23/02, bergenpeak wrote:
>>Looking at extended ACLs I see there's an option to define ACL
>>statements which can key on whether the IP packet contains a
>>fragment.
>>
>>Besides for NAT purposes, could someone provide me with a scenario
>>where one would need develop an ACL to key on IP packets carrying
>>fragements?  I'd be particularly interested in situations where one
>>might want to block a TCP application and decided that one had to
>>block traffic to the TCP port as well as fragments going to the server.
>>
>  >Thanks

I agree with Priscilla on the primary use. Another might be to 
troubleshoot FST encapsulation, which does not support fragmentation.




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=33011&t=32922
--------------------------------------------------
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to