In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-19 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >
Share
Shulou(Shulou.com)05/31 Report--
How to be attacked by ICMP, I believe that many inexperienced people are at a loss about this. Therefore, this article summarizes the causes and solutions of the problem. Through this article, I hope you can solve this problem.
What about ICMP attacks? We can take two precautions. The first is to restrict ICMP packets on the router. The bandwidth is set in a reasonable range. Even if ICMP provides supply, it is useless to occupy insufficient bandwidth. The second is that the host setting rejects all ICMP packets. Next, I will introduce you to the specific steps of what to do with the ICMP attack.
Set up ICMP filtering in Windows 2000 Server
Windows 2000 Server provides the routing and long distance access service, but it is not started by default, so start it first: click routing and long distance access in Administrative tools to launch the setup wizard. Select the "manually configure server" item and click the "next" button. After a moment, the system will prompt that "routing and long-distance access services are now installed. Do you want to start the service?", click the [Yes] button to start the service.
After the service is started, there will be a "IP routing selection" under the branch of the computer title, click it to open the branch, and then click "convention", which will show the network connection (that is, the network card) in the server on the right. Click on the network connection you want to configure with the right mouse button, click "Features" in the pop-up menu, and a window of network connection features will pop up. One is the "input picker" (to select the packets received by this server), and the other is the "output picker" (to select the packets sent by this server). Here you should click the [input picker] button. It will pop up a "add picker" window, and then click the "add" button to indicate that you want to add a selection condition.
Select "ICMP" from the drop-down list to the right of the Agreement, and enter "255" in the subsequent rendering of" ICMP Type "and" ICMP Encoding "to represent all ICMP types and their codes. There are many different types of ICMP (Ping is one type), and each type has many different states, which are indicated by different "codes".
Click the OK button to return to the input picker window, and you will now find an extra item in the picker list. Click the OK button to return to the Local connection window, then click the OK button, and the picker will take effect.
The second method is to set up a firewall to filter ICMP. The specific operation is to select the two functions of "protecting ICMP supply" and "preventing others from exploring with ping instructions" at the firewall to put an end to ICMP attacks.
After reading the above, have you mastered the method of how to be attacked by ICMP? If you want to learn more skills or want to know more about it, you are welcome to follow the industry information channel, thank you for reading!
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.