23-15
Cisco Security Appliance Command Line Configuration Guide
OL-12172-03
Chapter 23 Preventing Network Attacks
Configuring Connection Limits and Timeouts
Dead Connection Detection Overview
Dead connection detection detects a dead connection and allows it to expire, without expiring
connections that can still handle traffic. You configure DCD when you want idle, but valid connections
to persist.
When you enable DCD, idle timeout behavior changes. With idle timeout, DCD probes are sent to each
of the two end-hosts to determine the validity of the connection. If an end-host fails to respond after
probes are sent at the configured intervals, the connection is freed, and reset values, if configured, are
sent to each of the end-hosts. If both end-hosts response that the connection is valid, the activity timeout
is updated to the current time and the idle timeout is rescheduled accordingly.
TCP Sequence Randomization Overview
Each TCP connection has two ISNs: one generated by the client and one generated by the server. The
security appliance randomizes the ISN of the TCP SYN passing in both the inbound and outbound
directions.
Randomizing the ISN of the protected host prevents an attacker from predecting the next ISN for a new
connection and potentially hijacking the new session.
TCP initial sequence number randomization can be disabled if required. For example:
•
If another in-line firewall is also randomizing the initial sequence numbers, there is no need for both
firewalls to be performing this action, even though this action does not affect the traffic.
•
If you use eBGP multi-hop through the security appliance, and the eBGP peers are using MD5.
Randomization breaks the MD5 checksum.
•
You use a WAAS device that requires the security appliance not to randomize the sequence numbers
of connections.
Enabling Connection Limits
To set connection limits, perform the following steps:
Step 1
To identify the traffic, add a class map using the
class-map
command. See the
“Creating a Layer 3/4
Class Map for Through Traffic” section on page 21-3
or the
“Creating a Layer 3/4 Class Map for
Management Traffic” section on page 21-5
for more information.
Step 2
To add or edit a policy map that sets the actions to take with the class map traffic, enter the following
command:
hostname(config)#
policy-map
name
Step 3
To identify the class map from
Step 1
to which you want to assign an action, enter the following
command:
hostname(config-pmap)#
class
class_map_name
Step 4
To set maximum connection limits or whether TCP sequence randomization is enabled, enter the
following command:
hostname(config-pmap-c)#
set connection
{[
conn-max
number
] [
embryonic-conn-max
number
]
[
per-client-embryonic-max
number
] [
per-client-max
number
] [
random-sequence-number
{
enable
|
disable
}]}
where
number
is an integer between 0 and 65535. The default is 0, which means no limit on connections.
Содержание 500 Series
Страница 38: ...Contents xxxviii Cisco Security Appliance Command Line Configuration Guide OL 12172 03 ...
Страница 45: ...P A R T 1 Getting Started and General Information ...
Страница 46: ......
Страница 277: ...P A R T 2 Configuring the Firewall ...
Страница 278: ......
Страница 354: ...17 38 Cisco Security Appliance Command Line Configuration Guide OL 12172 03 Chapter 17 Configuring NAT NAT Examples ...
Страница 561: ...P A R T 3 Configuring VPN ...
Страница 562: ......
Страница 891: ...P A R T 4 System Administration ...
Страница 892: ......
Страница 975: ...P A R T 5 Reference ...
Страница 976: ......