
C
HAPTER
13
| Security Measures
DoS Protection
– 399 –
D
O
S P
ROTECTION
Use the Security > DoS Protection page to protect against denial-of-service
(DoS) attacks. A DoS attack is an attempt to block the services provided by
a computer or network resource. This kind of attack tries to prevent an
Internet site or service from functioning efficiently or at all. In general, DoS
attacks are implemented by either forcing the target to reset, to consume
most of its resources so that it can no longer provide its intended service,
or to obstruct the communication media between the intended users and
the target so that they can no longer communicate adequately. This section
describes how to protect against DoS attacks.
CLI R
EFERENCES
◆
"Denial of Service Protection" on page 957
P
ARAMETERS
These parameters are displayed:
◆
Echo/Chargen Attack
– Attacks in which the echo service repeats
anything sent to it, and the chargen (character generator) service
generates a continuous stream of data. When used together, they
create an infinite loop and result in a denial-of-service.
(Default: Disabled)
◆
Echo/Chargen Attack Rate
– Maximum allowed rate.
(Range: 64-2000 kbits/second; Default: 1000 kbits/second)
◆
Smurf Attack
– Attacks in which a perpetrator generates a large
amount of spoofed ICMP Echo Request traffic to the broadcast
destination IP address (255.255.255.255), all of which uses a spoofed
source address of the intended victim. The victim should crash due to
the many interrupts required to send ICMP Echo response packets.
(Default: Enabled)
◆
TCP Flooding Attack
– Attacks in which a perpetrator sends a
succession of TCP SYN requests (with or without a spoofed-Source IP)
to a target and never returns ACK packets. These half-open
connections will bind resources on the target, and no new connections
can be made, resulting in a denial of service. (Default: Disabled)
◆
TCP Flooding Attack Rate
– Maximum allowed rate. (Range: 64-2000
kbits/second; Default: 1000 kbits/second)
◆
TCP Null Scan
– A TCP NULL scan message is used to identify listening
TCP ports. The scan uses a series of strangely configured TCP packets
which contain a sequence number of 0 and no flags. If the target's TCP
port is closed, the target replies with a TCP RST (reset) packet. If the
target TCP port is open, it simply discards the TCP NULL scan.
(Default: Enabled)
◆
TCP-SYN/FIN Scan
– A TCP SYN/FIN scan message is used to identify
listening TCP ports. The scan uses a series of strangely configured TCP
packets which contain SYN (synchronize) and FIN (finish) flags. If the
Summary of Contents for ECS4110-28T
Page 2: ......
Page 4: ......
Page 63: ...FIGURES 63 Figure 428 Configuring VLAN Translation 1177...
Page 64: ...FIGURES 64...
Page 72: ...TABLES 72...
Page 74: ...SECTION I Getting Started 74...
Page 102: ...SECTION II Web Configuration 102 General IP Routing on page 679...
Page 154: ...CHAPTER 4 Basic Management Tasks Resetting the System 154...
Page 198: ...CHAPTER 5 Interface Configuration VLAN Trunking 198 Figure 65 Configuring VLAN Trunking...
Page 272: ...CHAPTER 9 Congestion Control Automatic Traffic Control 272...
Page 286: ...CHAPTER 10 Class of Service Layer 3 4 Priority Settings 286...
Page 420: ...CHAPTER 13 Security Measures DHCP Snooping 420...
Page 566: ...CHAPTER 14 Basic Administration Protocols OAM Configuration 566...
Page 638: ...CHAPTER 15 Multicast Filtering Multicast VLAN Registration for IPv6 638...
Page 662: ...CHAPTER 16 IP Configuration Setting the Switch s IP Address IP Version 6 662...
Page 678: ...CHAPTER 17 IP Services Configuring the PPPoE Intermediate Agent 678...
Page 792: ...CHAPTER 21 System Management Commands Switch Clustering 792...
Page 822: ...CHAPTER 23 Remote Monitoring Commands 822...
Page 888: ...CHAPTER 24 Authentication Commands PPPoE Intermediate Agent 888...
Page 968: ...CHAPTER 25 General Security Measures Port based Traffic Segmentation 968...
Page 994: ...CHAPTER 26 Access Control Lists ACL Information 994...
Page 1034: ...CHAPTER 28 Link Aggregation Commands Trunk Status Display Commands 1034...
Page 1044: ...CHAPTER 29 Power over Ethernet Commands 1044...
Page 1084: ...CHAPTER 33 UniDirectional Link Detection Commands 1084...
Page 1090: ...CHAPTER 34 Address Table Commands 1090...
Page 1194: ...CHAPTER 37 VLAN Commands Configuring Voice VLANs 1194...
Page 1388: ...CHAPTER 42 CFM Commands Delay Measure Operations 1388...
Page 1410: ...CHAPTER 44 Domain Name Service Commands 1410...
Page 1420: ...CHAPTER 45 DHCP Commands DHCP Relay 1420...
Page 1472: ...CHAPTER 46 IP Routing Commands IPv4 Commands 1472...
Page 1474: ...SECTION IV Appendices 1474...
Page 1502: ...COMMAND LIST 1502...
Page 1513: ......
Page 1514: ...ECS4110 28T ECS4110 28P ECS4110 52T ECS4110 52P E072014 ST R02 150200000929A...