tag:blogger.com,1999:blog-6193417800921617897.post3716471657233034482..comments2023-09-07T04:03:14.584-07:00Comments on CCIE TO BE: TCP Intercept: Watch vs Interceptdeadhead blueshttp://www.blogger.com/profile/10566569168999502387noreply@blogger.comBlogger3125tag:blogger.com,1999:blog-6193417800921617897.post-54225766194357402072012-08-07T00:59:54.051-07:002012-08-07T00:59:54.051-07:00by using a spoofed IP address and repeatedly sendi...by using a spoofed IP address and repeatedly sending purposely assembled SYN packets, attackers can cause the server to consume large amounts of resources keeping track of the bogus connections. This is known as a SYN flood attack.<br /><a href="http://internetworksolutions.net/cisco-training/cisco-ccna/ccna-security-training/" rel="nofollow">ccna security training in thailand<br /></a>ccie security bootcamphttps://www.blogger.com/profile/01000709471804709390noreply@blogger.comtag:blogger.com,1999:blog-6193417800921617897.post-67202902360373846412011-08-24T07:17:12.929-07:002011-08-24T07:17:12.929-07:00This comment has been removed by the author.jahas rahmanhttps://www.blogger.com/profile/08939742947901037407noreply@blogger.comtag:blogger.com,1999:blog-6193417800921617897.post-42500738041534556592009-07-02T18:49:06.247-07:002009-07-02T18:49:06.247-07:00The Best thing about this technology is -
The TCP ...The Best thing about this technology is -<br />The TCP intercept feature helps prevent SYN-flooding attacks by intercepting and validating TCP connection requests. In intercept mode, the TCP intercept software intercepts TCP synchronization (SYN) packets from clients to servers that match an extended access list. The software establishes a connection with the client on behalf of the destination server, and if successful, establishes the connection with the server on behalf of the client and knits the two half-connections together transparently. Thus, connection attempts from unreachable hosts will never reach the server. The software continues to intercept and forward packets throughout the duration of the connection.<br /><br />http://www.cisco.com/en/US/docs/ios/11_3/security/configuration/guide/scdenial.htmlUnknownhttps://www.blogger.com/profile/07214637626963644804noreply@blogger.com