ESR-Series. User manual
386
Step
Description
Command
Keys
23
Enable more detailed message output
about detected and blocked network
attacks in the CLI.
esr(config)# logging firewall
screen detailed
24
Enable mechanism of DoS attacks
detection and logging via CLI, syslog
and SNMP.
esr(config)# logging firewall
screen dos-defense
<ATACK_TYPE>
<ATACK_TYPE> – DoS attack
type, takes the following
values: icmp-threshold, land,
limit-session-destination, limit-
session-source, syn-flood, udp-
threshold, winnuke.
25
Enable mechanism of espionage
activity detection and logging via CLI,
syslog and SNMP.
esr(config)# logging firewall
screen spy-blocking
{ <ATACK_TYPE> | icmp-type
<ICMP_TYPE> }
<ATACK_TYPE> – espionage
activity type, takes the
following values: fin-no-ack, ip-
sweep, port-scan, spoofing,
syn-fin, tcp-all-flag, tcp-no-flag.
<ICMP_TYPE> – ICMP type,
takes the following values:
destination-unreachable, echo-
request, reserved, source-
quench, time-exceeded.
26
Enable mechanism of specialized
packets detection and logging via CLI,
syslog and SNMP.
esr(config)# logging firewall
screen suspicious-packets
<PACKET_TYPE>
<PACKET_TYPE> – non-
standard packets type, takes
the following values: icmp-
fragment, ip-fragment, large-
icmp, syn-fragment, udp-
fragment, unknown-protocols.
13.3.2 Description of attack protection mechanisms
Command
Description
ip firewall screen dos-defense icmp-
threshold
This command enables the protection against ICMP flood attacks. When the
protection is enabled, the amount of all types ICMP packets per second for one
destination address is limited. The attack leads to the host reboot and its failure
due to the necessity to process each query and respond to it.
firewall screen dos-defense land
This command enables the protection against land attacks. When the
protection is enabled, the packets with the same source and destination IP
addresses and with SYN flag in TCP header are blocked. The attack leads to the
host reboot and its failure due to the necessity to process each TCP SYN packet
and the attempts of the host to establish a TCP session with itself.
Содержание ESR Series
Страница 218: ...ESR Series User manual 218 ...
Страница 234: ...ESR Series User manual 234 In addition to RIP protocol configuration open UDP port 520 in the firewall ...
Страница 306: ...ESR Series User manual 306 Parameter targeted LDP Hold timer 45 seconds Keepalive holdtime 180 seconds ...
Страница 452: ...ESR Series User manual 452 Step Description Command Keys 4 Enable Tracking object esr config tracking enable ...
Страница 514: ...ESR Series User manual 514 esr show ntp peers ...