McAfee M-1250 IPS Configuration Guide - Page 182

Tunneled traffic, Small Fragment Threshold.

Page 182 highlights

McAfee® Network Security Platform 5.1 The IPS Sensor_Name node IPv6 Scanning Overlap Option Smallest Fragment Size Small Fragment Threshold IPv6 Parameters Configuration Specify how the Sensor should process IPv6 traffic. • Drop all IPv6 traffic (inline only): The Sensor drops IPv6 traffic the inline mode. • Pass IPv6 traffic without scanning: The Sensor passes IPv6 packets but does not scan them for attacks. • Scan IPv6 traffic for attacks: The Sensor scans IPv6 traffic for attacks. If you select Scan IPv6 traffic for attacks or if you had selected this earlier and you are selecting a different option now, then you need to reboot the Sensor for the change to take effect. By default, IPv6 packets are not parsed but allowed to pass. You can check the IPv6 status of a Sensor using the status command from CLI. Fragmented IPv6 packets may overlap, thus you need to select which data to process first: the newer data or the older data. • Old Data: common for Windows and Solaris systems • New Data • Drop: The Sensor drops any overlapping fragments. By default, older data is processed first. Smallest allowable size for an IPv6 fragment to be seen as "normal." All IPv6 fragments under this size are counted toward the IPv6 Small Fragment Threshold. The default size is 48. You can modify this to a value which is a multiple of 8 and is between 40 and 1280. The number of IPv6 fragments under the IPv6 Smallest Fragment Size allowed in 60 seconds. If this threshold is exceeded, an alert is sent. The default is 10000. You can modify this to a value between 100 and 100,000. For IPv6 traffic, system events are generated for the following: • Reserved address where source or destination address is all zeros or 15 zeros then 1. • Final fragment with zero offset where next header = 44, fragment offset =0, and fragment header M = 0. You can view system events from the Threat Analyzer. For information on Threat Analyzer, see the System Status Monitoring Guide. Tunneled traffic This section describes how Network Security Platform handles tunneled traffic. IPv6 packets can pass through IPv4 networks when they are encapsulated in an IPv4 packet. By a similar way, IPv4 packets can also pass through IPv6 networks. This method of 174

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259

McAfee® Network Security Platform 5.1
The IPS Sensor_Name node
174
IPv6 Parameters Configuration
IPv6 Scanning
Specify how the Sensor should process IPv6 traffic.
Drop all IPv6 traffic (inline only):
The Sensor drops IPv6 traffic
the inline mode.
Pass IPv6 traffic without scanning:
The Sensor passes IPv6
packets but does not scan them for attacks.
Scan IPv6 traffic for attacks:
The Sensor scans IPv6 traffic for
attacks.
If you select
Scan IPv6 traffic for attacks
or if you had selected
this earlier and you are selecting a different option now,
then you need to reboot the Sensor for the change to take
effect.
By default, IPv6 packets are not parsed but allowed to pass.
You can check the IPv6 status of a Sensor using the
status
command from CLI.
Overlap Option
Fragmented IPv6 packets may overlap, thus you need to
select which data to process first: the newer data or the
older data.
Old Data:
common for Windows and Solaris systems
New Data
Drop:
The Sensor drops any overlapping fragments.
By default, older data is processed first.
Smallest Fragment Size
Smallest allowable size for an IPv6 fragment to be seen as
"normal." All IPv6 fragments under this size are counted
toward the IPv6
Small Fragment Threshold.
The default size is 48. You can modify this to a value which
is a multiple of 8 and is between 40 and 1280.
Small Fragment Threshold
The number of IPv6 fragments under the IPv6
Smallest
Fragment Size
allowed in 60 seconds. If this threshold is
exceeded, an alert is sent.
The default is 10000. You can modify this to a value
between 100 and 100,000.
For IPv6 traffic, system events are generated for the following:
Reserved address where source or destination address is all zeros or 15 zeros then 1.
Final fragment with zero offset where next header = 44, fragment offset =0, and
fragment header M = 0.
You can view system events from the Threat Analyzer. For information on Threat
Analyzer, see the
System Status Monitoring Guide.
Tunneled traffic
This section describes how Network Security Platform handles tunneled traffic. IPv6
packets can pass through IPv4 networks when they are encapsulated in an IPv4 packet.
By a similar way, IPv4 packets can also pass through IPv6 networks. This method of