| | |
Disable the network routing daemon.
| Limits access to systems by would-be network sniffers.
|
|
Prevent the dissemination of information about the network topology.
| Prevents the broadcast of packets.
|
|
Prevents responses to broadcast echo requests and multicast echo requests.
|
|
For systems that are gateways to other domains, such as a firewall or
a VPN node, turn on strict source and destination multihoming.
| Prevents packets that do not have the address of the gateway in their
header from moving beyond the gateway.
|
|
Prevent DOS attacks by controlling the number of incomplete system connections.
| Limits the allowable number of incomplete TCP connections for a TCP
listener.
|
|
Prevent DOS attacks by controlling the number of permitted incoming
connections.
| Specifies the default maximum number of pending TCP connections for
a TCP listener.
|
|
Prevent ICMP redirection.
| Removes indicators
of the network topology.
|
|
Return network parameters to their secure default values.
| Increases security that was reduced by administrative actions.
|
|
Limit the number of concurrent processes for system services
that are controlled by inetd.
|
Limits the number of a concurrent inetd
process.
|
|