![Cisco 350XG series Скачать руководство пользователя страница 449](http://html.mh-extra.com/html/cisco/350xg-series/350xg-series_administration-manual_67491449.webp)
Security
Denial of Service Prevention
Cisco 350XG & 550XG Series 10G Stackable Managed Switches
435
19
•
Invasor Trojan
—Discards TCP packets with destination TCP port equal to
2140 and source TCP port equal to 1024.
•
Back Orifice Trojan
—Discards UDP packets with destination UDP port
equal to 31337 and source UDP port equal to 1024.
STEP 6
Click the following as required:
•
Martian Addresses
—Click
Edit
page.
•
SYN Filtering
—Click
Edit
•
SYN Rate Protection
—(In Layer 2 only) Click
Edit
•
ICMP Filtering
—Click
Edit
to go to the
•
IP Fragmented
—Click
Edit
page.
STEP 7
Click
Apply
. The Denial of Service prevention Security Suite settings are written to
the Running Configuration file.
SYN Protection
The network ports might be used by hackers to attack the device in a SYN attack,
which consumes TCP resources (buffers) and CPU power.
Since the CPU is protected using SCT, TCP traffic to the CPU is limited. However, if
one or more ports are attacked with a high rate of SYN packets, the CPU receives
only the attacker packets, thus creating Denial-of-Service.
When using the SYN protection feature, the CPU counts the SYN packets
ingressing from each network port to the CPU per second.
If the number is higher than the specific, user-defined threshold, a deny SYN with
MAC-to-me rule is applied on the port. This rule is unbound from the port every
user-defined interval (SYN Protection Period).
To configure SYN protection:
STEP 1
Click
Security
>
Denial of Service Prevention
>
SYN Protection
.
STEP 2
Enter the parameters.
•
Block SYN-FIN Packets
—Select to enable the feature. All TCP packets with
both SYN and FIN flags are dropped on all ports.