Chapter 8
| General Security Measures
Denial of Service Protection
– 264 –
Example
Console#show ip arp inspection vlan 1
VLAN ID DAI Status ACL Name ACL Status
-------- --------------- -------------------- --------------------
1 disabled sales static
Console#
Denial of Service Protection
A denial-of-service attack (DoS attack) is an attempt to block the services provided
by a computer or network resource. This kind of attack tries to prevent an Internet
site or service from functioning efficiently or at all. In general, DoS attacks are
implemented by either forcing the target to reset, to consume most of its resources
so that it can no longer provide its intended service, or to obstruct the
communication media between the intended users and the target so that they can
no longer communicate adequately.
This section describes commands used to protect against DoS attacks.
flow
tcp-udp-port-zero
This command protects against DoS attacks in which the UDP or TCP source port or
destination port is set to zero. This technique may be used as a form of DoS attack,
or it may just indicate a problem with the source device. Use the
no
form to restore
the default setting.
Syntax
flow tcp-udp-port-zero
{
drop
|
forward
}
no
flow tcp-udp-port-zero
drop
– Drops all packets with the Layer 4 source port or destination port
set to zero.
forward
– Forwards all packets with the Layer 4 source port or destination
port set to zero.
Default Setting
Drop
Table 53: DoS Protection Commands
Command
Function
Mode
flow tcp-udp-port-zero
Protects against attacks which set the Layer 4 source
or destination port to zero
GC
show flow
Shows the action taken against attacks which set
the Layer 4 source or destination port to zero
PE
Содержание EX-3524
Страница 2: ......
Страница 28: ...Figures 28 ...
Страница 34: ...Section I Getting Started 34 ...
Страница 58: ...Chapter 1 Initial Switch Configuration Setting the System Clock 58 ...
Страница 72: ...Chapter 2 Using the Command Line Interface CLI Command Groups 72 ...
Страница 156: ...Chapter 5 SNMP Commands Notification Log Commands 156 ...
Страница 164: ...Chapter 6 Remote Monitoring Commands 164 ...
Страница 218: ...Chapter 7 Authentication Commands Management IP Filter 218 ...
Страница 268: ...Chapter 8 General Security Measures Port based Traffic Segmentation 268 ...
Страница 292: ...Chapter 9 Access Control Lists ACL Information 292 ...
Страница 312: ...Chapter 10 Interface Commands Power Savings 312 ...
Страница 324: ...Chapter 11 Link Aggregation Commands Trunk Status Display Commands 324 ...
Страница 366: ...Chapter 15 Address Table Commands 366 ...
Страница 428: ...Chapter 17 VLAN Commands Configuring Voice VLANs 428 ...
Страница 572: ...Chapter 25 IP Interface Commands IPv6 Interface 572 ...
Страница 578: ...Section I Appendices 578 ...
Страница 594: ...Appendix C Customer Support Manuals 594 ...