23-11
Cisco Security Appliance Command Line Configuration Guide
OL-12172-03
Chapter 23 Preventing Network Attacks
Configuring TCP Normalization
Configuring TCP Normalization
The TCP normalization feature lets you specify criteria that identify abnormal packets, which the
security appliance drops when they are detected. This feature uses Modular Policy Framework, so that
implementing TCP normalization consists of identifying traffic, specifying the TCP normalization
criteria, and activating TCP normalization on an interface. See
Chapter 21, “Using Modular Policy
Framework,”
for more information.
To configure TCP normalization, perform the following steps:
Step 1
To specify the TCP normalization criteria that you want to look for, create a TCP map by entering the
following command:
hostname(config)#
tcp-map
tcp-map-name
For each TCP map, you can specify one or more settings.
Step 2
Configure the TCP map criteria by entering commands for one or more of the following options:
•
Prevent inconsistent TCP retransmissions:
hostname(config-tcp-map)#
check-retransmission
•
Verify the checksum:
hostname(config-tcp-map)#
checksum-verification
•
Allow packets whose data length exceeds the TCP maximum segment size. The default is to drop
these packets, so use this command to allow them.
hostname(config-tcp-map)#
exceed-mss
{
allow
|
drop
}
Total events
Shows the total number of events over each rate interval. The unfinished burst
interval presently occurring is not included in the total events. The only
exception to this rule is if the number of events in the unfinished burst interval
already exceeds the number of events in the oldest burst interval (#1 of 60)
when calculating the total events. In that case, the security appliance
calculates the total events as the last 59 complete intervals, plus the events so
far in the unfinished burst interval. This exception lets you monitor a large
increase in events in real time.
20-min, 1-hour,
8-hour, and 24-hour
Shows statistics for these fixed rate intervals.
Sent byte
Shows the number of successful bytes sent from the host.
Sent pkts
Shows the number of successful packets sent from the host.
Sent drop
Shows the number of packets sent from the host that were dropped because
they were part of a scanning attack.
Recv byte
Shows the number of successful bytes received by the host.
Recv pkts
Shows the number of successful packets received by the host.
Recv drop
Shows the number of packets received by the host that were dropped because
they were part of a scanning attack.
Table 23-3
show threat-detection statistics host Fields (continued)
Field
Description
Содержание 500 Series
Страница 38: ...Contents xxxviii Cisco Security Appliance Command Line Configuration Guide OL 12172 03 ...
Страница 45: ...P A R T 1 Getting Started and General Information ...
Страница 46: ......
Страница 277: ...P A R T 2 Configuring the Firewall ...
Страница 278: ......
Страница 354: ...17 38 Cisco Security Appliance Command Line Configuration Guide OL 12172 03 Chapter 17 Configuring NAT NAT Examples ...
Страница 561: ...P A R T 3 Configuring VPN ...
Страница 562: ......
Страница 891: ...P A R T 4 System Administration ...
Страница 892: ......
Страница 975: ...P A R T 5 Reference ...
Страница 976: ......