Configuring DoS Defend
DoS Defend Configuration
User Guide
937
Step 2
ip dos-prevent
Globally enable the DoS defend feature.
Step 3
ip dos-prevent type {
land | scan-synfin | xma-scan | null-scan | port-less-1024 | blat | ping-flood |
syn-flood | win-nuke | ping-of-death | smurf
}
Configure one or more defend types according to your needs. The types of DoS attack are
introduced as follows.
land:
The attacker sends a specific fake SYN (synchronous) packet to the destination host. Because
both the source IP address and the destination IP address of the SYN packet are set to be the IP
address of the host, the host will be trapped in an endless circle of building the initial connection.
scan-synfin:
The attacker sends the packet with its SYN field and the FIN field set to 1. The SYN
field is used to request initial connection whereas the FIN field is used to request disconnection.
Therefore, a packet of this type is illegal.
xma-scan:
The attacker sends the illegal packet with its TCP index, FIN, URG and PSH field set to 1.
null-scan:
The attacker sends the illegal packet with its TCP index and all the control fields set to 0.
During the TCP connection and data transmission, the packets with all the control fields set to 0 are
considered as the illegal packets.
port-less-1024:
The attacker sends the illegal packet with its TCP SYN field set to 1 and source port
smaller than 1024.
blat:
The attacker sends the illegal packet with the same source port and destination port on Layer
4 and with its URG field set to 1. Similar to the Land Attack, the system performance of the attacked
host is reduced because the Host circularly attempts to build a connection with the attacker.
ping-flood:
The attacker floods the destination system with Ping packets, creating a broadcast
storm that makes it impossible for system to respond to legal communication.
syn-flood:
The attacker uses a fake IP address to send TCP request packets to the server. Upon
receiving the request packets, the server responds with SYN-ACK packets. Since the IP address is
fake, no response will be returned. The server will keep on sending SYN-ACK packets. If the attacker
sends overflowing fake request packets, the network resource will be occupied maliciously and the
requests of the legal clients will be denied.
win-nuke:
An Operation System with bugs cannot process the URG (Urgent Pointer) of TCP packets.
If the attacker sends TCP packets to port139 (NetBIOS) of the host with Operation System bugs, it
will cause blue screen.
ping-of-death:
Ping of Death attack means that the attacker sends abnormal ping packets larger
than 65535 bytes to cause system crash on the target computer.
Note: Only T2600G-18TS supports Ping of Death.
smurf:
Smurf attack is a distributed denial-of-service attack in which large numbers of Internet
Control Message Protocol (ICMP) packets with the intended victim’s spoofed source IP are
broadcast to a computer network using an IP broadcast address. Most devices on a network will, by
default, respond to this by sending a reply to the source IP address. If the number of machines on
the network that receive and respond to these packets is very large, the victim’s computer will be
flooded with traffic.
Note: Only T2600G-18TS supports Smurf Attack.
Step 4
show ip dos-prevent
Verify the DoS Defend configuration.
Step 5
end
Return to privileged EXEC mode.
Содержание JetStream T2600G-28TS
Страница 32: ...Part 1 Accessing the Switch CHAPTERS 1 Overview 2 Web Interface Access 3 Command Line Interface Access ...
Страница 136: ...Part 4 Configuring LAG CHAPTERS 1 LAG 2 LAG Configuration 3 Configuration Examples 4 Appendix Default Parameters ...
Страница 154: ...Part 5 Configuring DDM Only for Certain Devices CHAPTERS 1 Overview 2 DDM Configuration 3 Appendix Default Parameters ...
Страница 264: ...Configuring VLAN VPN Configuration Examples User Guide 235 Figure 4 2 Create VLAN 100 ...
Страница 265: ...User Guide 236 Configuring VLAN VPN Configuration Examples Figure 4 3 Create VLAN 200 ...
Страница 268: ...Configuring VLAN VPN Configuration Examples User Guide 239 Figure 4 7 Creating VLAN 100 ...
Страница 275: ...User Guide 246 Configuring VLAN VPN Configuration Examples Figure 4 11 Create VLAN 100 ...
Страница 276: ...Configuring VLAN VPN Configuration Examples User Guide 247 Figure 4 12 Create VLAN 200 ...
Страница 277: ...User Guide 248 Configuring VLAN VPN Configuration Examples Figure 4 13 Create VLAN 1050 ...
Страница 280: ...Configuring VLAN VPN Configuration Examples User Guide 251 Figure 4 18 Creating VLAN 100 ...
Страница 285: ...Part 11 Configuring GVRP CHAPTERS 1 Overview 2 GVRP Configuration 3 Configuration Example 4 Appendix Default Parameters ...
Страница 512: ...Part 16 Configuring L2PT CHAPTERS 1 Overview 2 L2PT Configuration 3 Configuration Example 4 Appendix Default Parameters ...
Страница 633: ...Part 21 Configuring ARP CHAPTERS 1 Overview 2 ARP Configurations 3 Appendix Default Parameters ...
Страница 718: ...Configuring QoS Configuration Examples User Guide 689 Extended Power Via MDI Yes Inventory Management Yes ...
Страница 748: ...Part 24 Configuring AAA CHAPTERS 1 Overview 2 AAA Configuration 3 Configuration Examples 4 Appendix Default Parameters ...
Страница 801: ...Part 26 Configuring Port Security CHAPTERS 1 Overview 2 Port Security Configuration 3 Appendix Default Parameters ...
Страница 859: ...User Guide 830 Configuring ACL Configuration Example for ACL Figure 3 18 Configuring Rule 3 ...
Страница 874: ...Configuring ACL User Guide 845 ...
Страница 962: ...Part 31 Configuring DoS Defend CHAPTERS 1 Overview 2 DoS Defend Configuration 3 Appendix Default Parameters ...
Страница 969: ...Part 32 Monitoring the System CHAPTERS 1 Overview 2 Monitoring the CPU 3 Monitoring the Memory ...
Страница 974: ...Monitoring the System Monitoring the Memory User Guide 945 Unit Current Memory Utilization 1 74 ...
Страница 975: ...Part 33 Monitoring Traffic CHAPTERS 1 Traffic Monitor 2 Appendix Default Parameters ...
Страница 982: ...Part 34 Mirroring Traffic CHAPTERS 1 Mirroring 2 Configuration Examples 3 Appendix Default Parameters ...
Страница 1043: ...Part 37 Configuring DLDP CHAPTERS 1 Overview 2 DLDP Configuration 3 Appendix Default Parameters ...
Страница 1111: ...User Guide 1082 Appendix Default Parameters Parameter Default Setting Interval 1800 seconds Owner monitor Status Disabled ...
Страница 1112: ...Part 39 Diagnosing the Device Network CHAPTERS 1 Diagnosing the Device 2 Diagnosing the Network 3 Appendix Default Parameters ...