
C
HAPTER
29
| General Security Measures
Denial of Service Protection
– 1155 –
E
XAMPLE
Console(config)#dos-protection land
Console(config)#
dos-protection
tcp-null-scan
This command protects against DoS TCP-null-scan attacks in which a TCP
NULL scan message is used to identify listening TCP ports. The scan uses a
series of strangely configured TCP packets which contain a sequence
number of 0 and no flags. If the target's TCP port is closed, the target
replies with a TCP RST (reset) packet. If the target TCP port is open, it
simply discards the TCP NULL scan. Use the
no
form to disable this feature.
S
YNTAX
[
no
]
dos-protection tcp-null-scan
D
EFAULT
S
ETTING
Enabled
C
OMMAND
M
ODE
Global Configuration
E
XAMPLE
Console(config)#dos-protection tcp-null-scan
Console(config)#
dos-protection
tcp-syn-fin-scan
This command protects against DoS TCP-SYN/FIN-scan attacks in which a
TCP SYN/FIN scan message is used to identify listening TCP ports. The scan
uses a series of strangely configured TCP packets which contain SYN
(synchronize) and FIN (finish) flags. If the target's TCP port is closed, the
target replies with a TCP RST (reset) packet. If the target TCP port is open,
it simply discards the TCP SYN FIN scan. Use the
no
form to disable this
feature.
S
YNTAX
[
no
]
dos-protection syn-fin-scan
D
EFAULT
S
ETTING
Enabled
C
OMMAND
M
ODE
Global Configuration
E
XAMPLE
Console(config)#dos-protection syn-fin-scan
Console(config)#
Summary of Contents for ECS4660-28F
Page 1: ...Management Guide www edge core com ECS4660 28F Layer 3 Gigabit Ethernet Switch...
Page 2: ......
Page 4: ......
Page 12: ...ABOUT THIS GUIDE 12...
Page 64: ...CONTENTS 64...
Page 90: ...TABLES 90...
Page 92: ...SECTION I Getting Started 92...
Page 122: ...SECTION II Web Configuration 122 Multicast Routing on page 825...
Page 148: ...CHAPTER 3 Using the Web Interface Navigating the Web Browser Interface 148...
Page 224: ...CHAPTER 5 Interface Configuration VLAN Trunking 224 Figure 68 Configuring VLAN Trunking...
Page 262: ...CHAPTER 6 VLAN Configuration Configuring VLAN Translation 262...
Page 304: ...CHAPTER 9 Congestion Control Automatic Traffic Control 304...
Page 340: ...CHAPTER 11 Quality of Service Attaching a Policy Map to a Port 340...
Page 452: ...CHAPTER 13 Security Measures DHCP Snooping 452...
Page 740: ...CHAPTER 17 IP Services Configuring the PPPoE Intermediate Agent 740...
Page 866: ...CHAPTER 21 Multicast Routing Configuring PIMv6 for IPv6 866...
Page 882: ...CHAPTER 22 Using the Command Line Interface CLI Command Groups 882...
Page 1024: ...CHAPTER 26 Remote Monitoring Commands 1024...
Page 1030: ...CHAPTER 27 Flow Sampling Commands 1030...
Page 1088: ...CHAPTER 28 Authentication Commands PPPoE Intermediate Agent 1088...
Page 1162: ...CHAPTER 29 General Security Measures Configuring Port based Traffic Segmentation 1162...
Page 1186: ...CHAPTER 30 Access Control Lists ACL Information 1186...
Page 1214: ...CHAPTER 31 Interface Commands Transceiver Threshold Configuration 1214...
Page 1238: ...CHAPTER 33 Port Mirroring Commands RSPAN Mirroring Commands 1238...
Page 1258: ...CHAPTER 34 Congestion Control Commands Automatic Traffic Control Commands 1258...
Page 1270: ...CHAPTER 36 UniDirectional Link Detection Commands 1270...
Page 1276: ...CHAPTER 37 Address Table Commands 1276...
Page 1336: ...CHAPTER 39 ERPS Commands 1336...
Page 1386: ...CHAPTER 40 VLAN Commands Configuring Voice VLANs 1386...
Page 1406: ...CHAPTER 41 Class of Service Commands Priority Commands Layer 3 and 4 1406...
Page 1424: ...CHAPTER 42 Quality of Service Commands 1424...
Page 1536: ...CHAPTER 43 Multicast Filtering Commands MLD Proxy Routing 1536...
Page 1602: ...CHAPTER 45 CFM Commands Delay Measure Operations 1602...
Page 1624: ...CHAPTER 47 Domain Name Service Commands 1624...
Page 1646: ...CHAPTER 48 DHCP Commands DHCP Server 1646...
Page 1974: ...SECTION IV Appendices 1974...
Page 1980: ...APPENDIX A Software Specifications Management Information Bases 1980...