Chapter 24: General Security Measures
Denial of Service Protection
– 885 –
rate
– Maximum allowed rate. (Range: 64-2000 kbits/second)
D
EFAULT
S
ETTING
Disabled, 1000 kbits/second
C
OMMAND
M
ODE
Global Configuration
E
XAMPLE
Console(config)#dos-protection echo-chargen 65
Console(config)#
dos-protection
smurf
This command protects against DoS smurf attacks in which a perpetrator
generates a large amount of spoofed ICMP Echo Request traffic to the
broadcast destination IP address (255.255.255.255), all of which uses a
spoofed source address of the intended victim. The victim should crash due
to the many interrupts required to send ICMP Echo response packets. Use
the
no
form to disable this feature.
S
YNTAX
[
no
]
dos-protection smurf
D
EFAULT
S
ETTING
Enabled
C
OMMAND
M
ODE
Global Configuration
E
XAMPLE
Console(config)#dos-protection smurf
Console(config)#
dos-protection
tcp-flooding
This command protects against DoS TCP-flooding attacks in which a
perpetrator sends a succession of TCP SYN requests (with or without a
spoofed-Source IP) to a target and never returns ACK packets. These
half-open connections will bind resources on the target, and no new
connections can be made, resulting in a denial of service. Use the
no
form
to disable this feature.
S
YNTAX
dos-protection tcp-flooding
[
bit-rate-in-kilo
rate
]
no
dos-protection tcp-flooding
rate
– Maximum allowed rate. (Range: 64-2000 kbits/second)
Summary of Contents for SSE-G2252
Page 42: ...44 General IP Routing on page 627...
Page 603: ...Chapter 16 IP Configuration Setting the Switch s IP Address IP Version 6 609...
Page 883: ...Chapter 24 General Security Measures Port based Traffic Segmentation 894...
Page 989: ...Chapter 30 Congestion Control Commands Automatic Traffic Control Commands 1000 Console...
Page 1007: ...Chapter 33 Address Table Commands 1019...
Page 1137: ...Chapter 38 Quality of Service Commands 1150...