The malformed packet attack technology uses some legitimate packets to perform reconnaissance or data detection on the network. These packets are legal application types, but they are rarely used in normal networks.
Note: 1. USG A and USG B each start the BFD state machine. The initial state is Down and the BFD packet is Down. For a static BFD session, the value of the Your Discriminator is specified by the user. For the dynamic BFD session, the value of the Your Discriminator is 0. 2. After receiving the BFD packet whose status is Down, the USG B switches to Init. And send a BFD packet with the status of Init. 3. If the local BFD state of USG B is Init, the packets of the received state are Down. 4. The BFD state of USG A is the same as that of USG B. 5. After receiving the BFD packet in the Init state, the local state is switched to Up. 6. The BFD status of USG A changes with USG B. 7. After the state transition of 'DOWN-->INIT' occurs on USG A and USG B, a timeout timer is started. If the BFD packet is in the Init or Up state, the local state is automatically switched back to Down.
Antonio
1 years agoLyda
1 years agoEna
1 years agoDorethea
1 years agoPedro
1 years agoBarney
1 years agoDallas
1 years agoTommy
1 years agoAnnita
1 years agoDavida
1 years agoMirta
1 years agoDorothy
1 years agoEnola
1 years agoAbel
1 years agoHillary
1 years agoChara
1 years agoTrina
1 years agoMerlyn
1 years agoUla
1 years ago