EasyManua.ls Logo

ELTEX MES3108 - 5.30 Configuration of Protection from DoS Attacks

ELTEX MES3108
243 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
MES3000 Ethernet switch series 207
offsetbyte offset within a packet. Basic offset is considered as a starting
point.
maskmask. Packet analysis is performed only for the bytes digits which
have "1" specified as defined in the mask.
valuethe set value.
no offset-list offset_list_name
Removes a previously created list.
5.30 Configuration of Protection from DoS Attacks
This type of commands provides means for blocking some widely spread types of DoS attacks.
Global Configuration Mode Commands
Command line in the global configuration mode appears as follows:
console (config)#
Table 5.252 Configuration commands for protection from DoS attacks
Parameter
Value
Action
security-suite deny
martian-addresses
{reserved|add ip_address
|remove ip_address }
ip_address: IP address
Denies frames with invalid (Martian) IP source addresses
(loopback, broadcast, multicast).
security-suite dos protect
{add|remove}
{stacheldraht|
invasor-trojan|
back-orifice-trojan}
-
Denies/permits certain types of traffic which are often used by
malware:
- stacheldrahtfilters out TCP packets with source port 16660;
- invasor-trojanfilters out TCP packets with destination port
2140 and source port 2140;
- back-orifice-trojanfilters out UDP packets with destination
port 31337 and source port 1024.
security-suite enable
-
Enables the security-suite command class.
no security-suite enable
Disables the security-suite command class.
Commands for Interface Configuration of Ethernet Interface and a Group of Ports
Command line in the interface configuration mode for Ethernet interface and a group of ports appears as
follows:
console (config-if)#
Table 5.253 Command for configuration of interface protection from DoS attacks
Command
Value
Action
security-suite deny
{fragmented|icmp|syn}
{add|remove} {any|
ip_address [mask]}
ip_address: IP address
mask: mask in the form of
IP address or prefix
Creates/removes a rule denying traffic which fulfils criteria.
- fragmentedfragmented packets;
- icmpICMP traffic;
- synsyn packets.
no security-suite deny
{fragmented|icmp|syn}
{add|remove} {any|
ip_address [mask]}
Restores the default value.
security-suite dos
syn-attack rate {any|
ip_address [mask]}
rate: 51000 packets per
second
ip_address: IP address
mask: mask in the form of
IP address or prefix
Specifies a threshold for syn requests for a definite IP
address/network. All frames exceeding the threshold will be
ignored.
no security-suite dos
syn-attack {any|
ip_address [mask]}
Restores the default value.

Table of Contents

Related product manuals