Configuring Security
Configuring DoS Protection
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x
215
16
•
SYN-FIN and SYN-RST protections are enabled by default.
•
The default protection mode of SYN protection is Block and Report. The
default threshold is 60 SYN packets per second. The default period of port
recovery is 60 seconds.
Configuring DoS Security Suite Settings
Use the Security Suite Settings page to enable filtering of traffic. This protects the
network from a DoS and DDoS attacks.
NOTE
Before activating DoS protection, you must unbind all ACLs or advanced QoS
policies that are bound to a port. ACL and advanced QoS policies are not active
when a port has DoS protection.
To set global DoS protection settings and monitor SCT:
STEP 1
Click
Security
>
Denial of Service
>
Security Suite Settings
.
The
CPU Protection Mechanism
field displays
Enabled
, which indicates that
SCT is enabled.
STEP 2
Click
Details
beside the
CPU Utilization
field to go to the CPU Utilization page
and view CPU resource utilization information.
STEP 3
Click
Edit
beside the
TCP SYN Protection
field
to go to the SYN Protection page
and enable this feature. See
for more details.
STEP 4
In the
Denial of Service Protection
area, enable one or more of the following DoS
protection options and specify the threshold if necessary:
•
DA Equals SA
•
ICMP Frag Packets
•
ICMP Ping Maximum Length
•
IPv6 Minimum Frag Length
•
Land
•
Null Scan
•
POD
•
Smurf Netmask
•
TCP Source Port Less 1024