104
EPICenter Concepts and Solutions Guide
Managing Network Security
switch or router that are more costly than others, and although normal traffic is not a problem,
exception traffic must be handled by the switch’s CPU in software.
Some packets that the switch processes in the CPU software include:
•
Learning new traffic
•
Routing and control protocols including ICMP, BGP and OSPF
•
Switch management traffic (switch access by Telnet, SSH, HTTP, SNMP, etc.)
•
Other packets directed to the switch that must be discarded by the CPU
If any one of these functions is overwhelmed, the CPU may become too busy to service other functions
and switch performance will suffer. Even with very fast CPUs, there will always be ways to overwhelm
the CPU by with packets requiring costly processing.
DoS Protection is designed to help prevent this degraded performance by attempting to characterize the
problem and filter out the offending traffic so that other functions can continue. When a flood of
packets is received from the switch, DoS Protection will count these packets. When the packet count
nears the alert threshold, packets headers are saved. If the threshold is reached, then these headers are
analyzed, and a hardware access control list (ACL) is created to limit the flow of these packets to the
CPU. With the ACL in place, the CPU will have the cycles to process legitimate traffic and continue
other services.
Once DoS Protection is setup on the switches, you could define an Alarm for the traps “DOS Threshold
cleared” and “DOS Threshold reached”, and have it take an action such as an Email notification or
sending a page to a network administrator.
Refer to the
ExtremeWare Software User Guide
for information on configuring DoS Protection on your
Extreme Networks switches.
Another example would be to detect a TCP SYN flood as indicating a potential DoS attack. A SYN flood
occurs when a malicious entity sends a flood of TCP SYN packets to a host. For each of these SYN
requests, the host reserves system resources for the potential TCP connection. If many of these SYN
packets are received, the victim host runs out of resources, effectively denying service to any legitimate
TCP connection.
Using the Alarms Manager, you can detect a potential SYN flood by defining a threshold alarm, using a
delta rising threshold rule on the TCP-MIB object tcpPassiveOpens. If this MIB object rises quickly in a
short delta period, the system may be under a DoS attack.
See “Using the EPICenter Alarm System” on page 41 for more information about creating alarms such
as these.
Device Syslog History
Syslog messages report important information about events in your network. Each Extreme Networks
products acts as a syslog client, sending syslog messages to configured syslog servers. These messages
include information that reveals the security status of your network. Using syslog messages, you can
track events in your network that may affect security.
Содержание EPICenter 5.0
Страница 12: ...12 EPICenter Concepts and Solutions Guide Preface...
Страница 76: ...76 EPICenter Concepts and Solutions Guide Managing your Network Assets...
Страница 92: ...92 EPICenter Concepts and Solutions Guide Managing VLANs...
Страница 116: ...116 EPICenter Concepts and Solutions Guide Managing Wireless Networks...
Страница 146: ...146 EPICenter Concepts and Solutions Guide VoIP and EPICenter Avaya Integrated Management...
Страница 163: ...Appendices...
Страница 164: ......
Страница 178: ...178 EPICenter Concepts and Solutions Guide Troubleshooting...