13
Ridgeline Concepts and Solutions Guide
197
●
Other packets directed to the switch that must be discarded by the CPU
If any one of these functions is overwhelmed, the CPU may become too busy to service other functions
and switch performance will suffer. Even with very fast CPUs, there will always be ways to overwhelm
the CPU by with packets requiring costly processing.
DoS Protection is designed to help prevent this degraded performance by attempting to characterize the
problem and filter out the offending traffic so that other functions can continue. When a flood of
packets is received from the switch, DoS Protection will count these packets. When the packet count
nears the alert threshold, packets headers are saved. If the threshold is reached, then these headers are
analyzed, and a hardware access control list (ACL) is created to limit the flow of these packets to the
CPU. With the ACL in place, the CPU will have the cycles to process legitimate traffic and continue
other services.
Once DoS Protection is setup on the switches, you could define an Alarm for the traps “DOS Threshold
cleared” and “DOS Threshold reached”, and have it take an action such as an Email notification or
sending a page to a network administrator.
Refer to the
ExtremeWare Software User Guide
for information on configuring DoS Protection on your
Extreme switches.
Another example would be to detect a TCP SYN flood as indicating a potential DoS attack. A SYN flood
occurs when a malicious entity sends a flood of TCP SYN packets to a host. For each of these SYN
requests, the host reserves system resources for the potential TCP connection. If many of these SYN
packets are received, the victim host runs out of resources, effectively denying service to any legitimate
TCP connection.
Using the Alarm Manager, you can detect a potential SYN flood by defining a threshold alarm, using a
delta rising threshold rule on the TCP-MIB object tcpPassiveOpens. If this MIB object rises quickly in a
short delta period, the system may be under a DoS attack.
See the
Ridgeline Reference Guide
for more information about creating alarms such as these.
Device Syslog History
Syslog messages report important information about events in your network. Each Extreme Networks
products acts as a syslog client, sending syslog messages to configured syslog servers. These messages
include information that reveals the security status of your network. Using syslog messages, you can
track events in your network that may affect security.
Ridgeline creates a dynamic log of syslog messages in the Reports feature. Use this log to scan for
critical security events such as:
Table 6: Security-based Syslog Messages
Error Message
Explanation
<CRIT:IPHS> Possible spoofing
attack
You have a duplicate IP address on the network (same as an
address on a local interface).
or
The IP source address equals a local interface on the router and
the packet needs to go up the IP stack i.e., multicast/broadcast. In
the BlackDiamond, if a multicast packet is looped back from the
switch fabric, this message appears.
Содержание Ridgeline 3.0
Страница 14: ...Related Publications Ridgeline Concepts and Solutions Guide 12 ...
Страница 26: ...Ridgeline Overview Ridgeline Concepts and Solutions Guide 24 ...
Страница 52: ...Getting Started with Ridgeline Ridgeline Concepts and Solutions Guide 50 ...
Страница 78: ...Using Map Views Ridgeline Concepts and Solutions Guide 76 ...
Страница 88: ...Provisioning Network Resources Ridgeline Concepts and Solutions Guide 86 ...
Страница 103: ...6 Ridgeline Concepts and Solutions Guide 101 Figure 63 E Line Service Details Window ...
Страница 104: ...Managing Ethernet Services Ridgeline Concepts and Solutions Guide 102 ...
Страница 113: ...7 Ridgeline Concepts and Solutions Guide 111 Figure 72 Importing E Line Service Dialog with Validation Errors ...
Страница 114: ...Importing Services Ridgeline Concepts and Solutions Guide 112 ...
Страница 132: ...Managing and Monitoring VPLS Domains Ridgeline Concepts and Solutions Guide 130 ...
Страница 146: ...Managing VLANs Ridgeline Concepts and Solutions Guide 144 ...
Страница 190: ...Managing Your EAPS Configuration Ridgeline Concepts and Solutions Guide 188 ...
Страница 202: ...Managing Network Security Ridgeline Concepts and Solutions Guide 200 ...
Страница 350: ...Book Title Ridgeline Concepts and Solutions Guide 348 ...
Страница 372: ...Book Title Ridgeline Concepts and Solutions Guide 370 ...