D-Link DGS-1100-24P Reference Guide - Page 69

Storm Control, DoS Attack Prevention Settings, Storm Control Port Settings

Page 69 highlights

D-Link DGS-1100 Series Switch User Manual Storm Control This window is used to view and configure the storm control settings. Once a packet storm has been detected, the Switch will drop packets coming into the Switch until the storm has subsided. To view the following window, click Security > Storm Control, as shown below: Figure 9-3 Storm Control window The fields that can be configured for Storm Control Port Settings are described below: Parameter From Port / To Port Type Rate Limit Description Select the appropriate port range used for the configuration here. Select the type of storm attack that will be controlled here. Options to choose from are Broadcast, Multicast, and Unicast. Select a data rate from 512Kbps to 512Mbps. Click the Apply button to accept the changes made. DoS Attack Prevention Settings This window is used to view and configure the Denial-of-Service (DoS) attack prevention settings. The following well-known DoS types which can be detected by most switches: • Land Attack: This type of attack involves IP packets where the source and destination address are set to the address of the target device. It may cause the target device to reply to itself continuously. • Blat Attack: This type of attack will send packets with the TCP/UDP source port equal to the destination port of the target device. It may cause the target device to respond to itself. • TCP-Null: This type of attack involves port scanning by using specific packets which contain a sequence number of 0 and no flags. • TCP-Xmas: This type of attack involves port scanning by using specific packets which contain a sequence number of 0 and the Urgent (URG), Push (PSH), and FIN flags. • TCP SYN-FIN: This type of attack involves port scanning by using specific packets which contain SYN and FIN flags. • TCP SYN SrcPort Less 1024: This type of attack involves port scanning by using specific packets which contain source port 0 to 1023 and SYN flag. • Ping of Death Attack: A ping of death is a type of attack on a computer that involves sending a malformed or otherwise a malicious ping to a computer. A ping is normally 64 bytes in size (many computers cannot handle a ping larger than the maximum IP packet size) which is 65535 bytes. The sending of a ping of this size can crash the target computer. Traditionally, this bug has been relatively easy to exploit. Generally, sending a 65536 byte ping packet is illegal according to networking protocol, but a packet of such a size can be sent if it is fragmented; when the target computer reassembles the packet, a buffer overflow can occur, which often causes a system crash. • All Types: All of above types. 63

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90

D-Link DGS-1100 Series Switch User Manual
Storm Control
This window is used to view and configure the storm control settings. Once a packet storm has been
detected, the Switch will drop packets coming into the Switch until the storm has subsided.
To view the following window, click
Security > Storm Control
, as shown below:
Figure 9-3 Storm Control window
The fields that can be configured for
Storm Control Port Settings
are described below:
Parameter
Description
From Port / To Port
Select the appropriate port range used for the configuration
here.
Type
Select the type of storm attack that will be controlled here.
Options to choose from are
Broadcast
,
Multicast
, and
Unicast
.
Rate Limit
Select a data rate from 512Kbps to 512Mbps.
Click the
Apply
button to accept the changes made.
DoS Attack Prevention Settings
This window is used to view and configure the Denial-of-Service (DoS) attack prevention settings.
The following well-known DoS types which can be detected by most switches:
Land Attack:
This type of attack involves IP packets where the source and destination
address are set to the address of the target device. It may cause the target device to reply to
itself continuously.
Blat Attack
: This type of attack will send packets with the TCP/UDP source port equal to the
destination port of the target device. It may cause the target device to respond to itself.
TCP-Null:
This type of attack involves port scanning by using specific packets which contain
a sequence number of 0 and no flags.
TCP-Xmas:
This type of attack involves port scanning by using specific packets which
contain a sequence number of 0 and the Urgent (URG), Push (PSH), and FIN flags.
TCP SYN-FIN:
This type of attack involves port scanning by using specific packets which
contain SYN and FIN flags.
TCP SYN SrcPort Less 1024:
This type of attack involves port scanning by using specific
packets which contain source port 0 to 1023 and SYN flag.
Ping of Death Attack:
A ping of death is a type of attack on a computer that involves
sending a malformed or otherwise a malicious ping to a computer. A ping is normally 64
bytes in size (many computers cannot handle a ping larger than the maximum IP packet size)
which is 65535 bytes. The sending of a ping of this size can crash the target computer.
Traditionally, this bug has been relatively easy to exploit. Generally, sending a 65536 byte
ping packet is illegal according to networking protocol, but a packet of such a size can be
sent if it is fragmented; when the target computer reassembles the packet, a buffer overflow
can occur, which often causes a system crash.
All Types:
All of above types.
63