McAfee M-1250 IPS Configuration Guide - Page 208

Considerations in rate limiting, Rate limiting of application protocols using SSL

Page 208 highlights

McAfee® Network Security Platform 5.1 The IPS Sensor_Name node 3 If the Sensor is not able to identify a packet in terms of protocol or TCP/UDP ports defined for rate limiting, the rate limiting queues configured for IP Protocol Number are searched. If a match is found, the packet is rate limited according to the rate limiting queue configured for IP Protocol Number. To explain the above, if a rate limiting rule is configured for HTTP protocol as well as TCP Port 80 on a Sensor monitoring port, the Sensor first searches for a matching HTTP rate limiting rule (and not the TCP Port rule). All the incoming HTTP traffic is matched with the configured HTTP protocol rule and rate limited accordingly. Note that in this case, the Protocol rule is given precedence to the Port rule. Note1 : The terms rate limiting rule and rate limiting queue are used synonymously. Note 2: The example mentioned above are applicable to DiffServ and VLAN tagging as well. Considerations in rate limiting The following sections explains two important considerations with respect to rate limiting in the Network Security Sensor: • Rate limiting of application protocols using SSL (on page 200) • Port-level limitations (on page 201) Rate limiting of application protocols using SSL The Sensor rate limiting functionality for protocols with SSL connection, depends on whether the Sensor is configured to decrypt the traffic. SSL keys are present in the Sensor When the Sensor is configured to have SSL keys to decrypt the traffic, the HTTPS traffic reaching the Sensor will be decrypted, and decrypted application protocol will be HTTP (and not SSL). Several scenarios are possible depending on the traffic and rate limiting rule configured. In all the scenarios, the application protocol HTTP using SSL (HTTPS) is used as the example. Case 1: Assume that a SSL rate limiting rule is configured, and HTTPS traffic is processed by the Sensor. In this case, the Sensor will decrypt the HTTPS traffic into HTTP. When the HTTPS traffic rate is beyond the configured SSL rate limiting rule, the Sensor will not rate limit the traffic. This is because the decrypted traffic is HTTP, but the rate limiting rule is configured for SSL. For rate limiting such a traffic, you have to configure a rate limiting rule for HTTP. This is explained in the next case. Case 2: Suppose the HTTP rate limiting rule is configured, and HTTPS traffic is processed by the Sensor. In this case, the Sensor will decrypt the HTTPS traffic into HTTP. The Sensor performs rate limiting of the decrypted traffic. This is because the decrypted traffic is HTTP and the rate limiting rule is also configured for HTTP. 200

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259

McAfee® Network Security Platform 5.1
The IPS Sensor_Name node
200
3
If the Sensor is not able to identify a packet in terms of protocol or TCP/UDP ports
defined for rate limiting, the rate limiting queues configured for
IP Protocol Number
are
searched. If a match is found, the packet is rate limited according to the rate limiting
queue configured for IP Protocol Number.
To explain the above, if a rate limiting rule is configured for HTTP protocol as well as TCP
Port 80 on a Sensor monitoring port, the Sensor first searches for a matching HTTP rate
limiting rule (and not the TCP Port rule). All the incoming HTTP traffic is matched with the
configured HTTP protocol rule and rate limited accordingly. Note that in this case, the
Protocol rule is given precedence to the Port rule.
Note1 :
The terms
rate limiting rule
and
rate limiting queue
are used synonymously.
Note 2:
The example mentioned above are applicable to DiffServ and VLAN tagging
as well.
Considerations in rate limiting
The following sections explains two important considerations with respect to rate limiting in
the Network Security Sensor:
Rate limiting of application protocols using SSL (on page
200
)
Port-level limitations (on page
201
)
Rate limiting of application protocols using SSL
The Sensor rate limiting functionality for protocols with SSL connection, depends on
whether the Sensor is configured to decrypt the traffic.
SSL keys are present in the Sensor
When the Sensor is configured to have SSL keys to decrypt the traffic, the HTTPS traffic
reaching the Sensor will be decrypted, and decrypted application protocol will be HTTP
(and not SSL). Several scenarios are possible depending on the traffic and rate limiting
rule configured. In all the scenarios, the application protocol HTTP using SSL (HTTPS) is
used as the example.
Case 1:
Assume that a SSL rate limiting rule is configured, and HTTPS traffic is processed by the
Sensor. In this case, the Sensor will decrypt the HTTPS traffic into HTTP. When the
HTTPS traffic rate is beyond the configured SSL rate limiting rule, the Sensor will not rate
limit the traffic. This is because the decrypted traffic is HTTP, but the rate limiting rule is
configured for SSL. For rate limiting such a traffic, you have to configure a rate limiting rule
for HTTP. This is explained in the next case.
Case 2:
Suppose the HTTP rate limiting rule is configured, and HTTPS traffic is processed by the
Sensor. In this case, the Sensor will decrypt the HTTPS traffic into HTTP. The Sensor
performs rate limiting of the decrypted traffic. This is because the decrypted traffic is HTTP
and the rate limiting rule is also configured for HTTP.