D-Link DGS-1250 Emulator - Page 172

DoS Prevention Commands

Page 172 highlights

DGS-1250 Series Gigabit Ethernet Smart Managed Switch CLI Reference Guide 22. DoS Prevention Commands 22-1 dos-prevention This command is used to enable and configure the DoS prevention mechanism. Use the no form of this command to reset DoS prevention to the default setting. dos-prevention DOS-ATTACK-TYPE no dos-prevention DOS-ATTACK-TYPE Parameters DOS-ATTACK-TYPE Specifies the string that identifies the DoS type to be configured. Default By default all supported DoS types are disabled. Command Mode Global Configuration Mode. Usage Guideline Use the dos-prevention DOS-ATTACK-TYPE command to enabled and configure the DoS prevention mechanism for a specific DoS attack type or for all supported types. The DoS prevention mechanisms (matching and taking action) are hardware-based features. When DoS prevention is enabled, the Switch will log the event if any attack packet was received. Use the no dos-prevention all command to disable the DoS prevention mechanism for all supported types. All the related settings will be reverted back to the default for the specified attack types. The following well-known DoS types which can be detected by most switches:  Blat - This type of attack will send packets with TCP/UDP source port equals to destination port to the target device. It may cause the target device respond to itself.  Land - A LAND attack involves with IP packets where the source and destination address are set to address of the target device. It may cause the target device reply to itself continuously.  TCP-NULL-scan: Port scanning by using specific packets, which contain a sequence number of 0 and no flags.  TCP-SYN-fin - Port scanning by using specific packets, which contain SYN and FIN flags.  TCP-SYN-SRCport-less-1024: Port scanning by using specific packets, which contain source port 0-1023 and SYN flag.  TCP-xmas-scan - Port scanning by using specific packets, which contain a sequence number of 0 and the Urgent (URG), Push (PSH), and FIN flags.  Ping-death - A ping of death is a type of attack on a computer that involves sending a malformed or otherwise malicious ping to a computer. A ping is normally 64 bytes in size; many computers cannot handle a ping larger than the maximum IP packet size, which is 65,535 bytes. Sending a ping of this size can crash the target computer. Traditionally, this bug has been relatively easy to exploit. Generally, sending a 65536 byte ping packet is illegal according to networking protocol, but a packet of such a size can be sent if it is fragmented; when the target computer reassembles the packet, a buffer overflow can occur, which often cause a system crash.  TCP-tiny-frag - Tiny TCP Fragment attacker uses the IP fragmentation to create extremely small fragments and force the TCP header information into a separate packet fragment to pass through the check function of the router and issue an attack.  Smurf - Attacker sends a large amount of ICMP request packets to IP broadcast address, the source IP address of the attacking packets equals to the victim's IP address. If the router delivers traffic to the IP broadcast address, all hosts in that IP network will reply ICMP to the victim's IP address.  tcp-syn-rst - A TCP packet with the TCP SYN and RST flags which are both illegal and potentially a security threat.  All - All of above types. 169

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442
  • 443
  • 444
  • 445
  • 446
  • 447
  • 448
  • 449
  • 450
  • 451
  • 452
  • 453
  • 454
  • 455
  • 456
  • 457
  • 458
  • 459
  • 460
  • 461
  • 462
  • 463
  • 464
  • 465
  • 466
  • 467
  • 468
  • 469
  • 470
  • 471
  • 472
  • 473
  • 474
  • 475
  • 476
  • 477
  • 478
  • 479
  • 480
  • 481
  • 482
  • 483
  • 484
  • 485
  • 486
  • 487
  • 488
  • 489
  • 490
  • 491
  • 492
  • 493
  • 494
  • 495
  • 496
  • 497
  • 498
  • 499
  • 500
  • 501
  • 502
  • 503
  • 504
  • 505
  • 506
  • 507
  • 508
  • 509
  • 510
  • 511
  • 512
  • 513
  • 514
  • 515
  • 516
  • 517
  • 518
  • 519
  • 520
  • 521
  • 522
  • 523
  • 524
  • 525
  • 526
  • 527
  • 528
  • 529
  • 530
  • 531
  • 532
  • 533
  • 534
  • 535
  • 536
  • 537
  • 538
  • 539
  • 540
  • 541
  • 542
  • 543
  • 544
  • 545
  • 546
  • 547
  • 548
  • 549
  • 550
  • 551
  • 552
  • 553
  • 554
  • 555
  • 556
  • 557
  • 558
  • 559

DGS-1250 Series Gigabit Ethernet Smart Managed Switch CLI Reference Guide
169
22.
DoS Prevention Commands
22-1
dos-prevention
This command is used to enable and configure the DoS prevention mechanism. Use the
no
form of this command
to reset DoS prevention to the default setting.
dos-prevention
DOS-ATTACK-TYPE
no dos-prevention
DOS-ATTACK-TYPE
Parameters
DOS-ATTACK-TYPE
Specifies the string that identifies the DoS type to be configured.
Default
By default all supported DoS types are disabled.
Command Mode
Global Configuration Mode.
Usage Guideline
Use the
dos-prevention
DOS-ATTACK-TYPE
command to enabled and configure the DoS prevention mechanism
for a specific DoS attack type or for all supported types. The DoS prevention mechanisms (matching and taking
action) are hardware-based features.
When DoS prevention is enabled, the Switch will log the event if any attack packet was received.
Use the no
dos-prevention all
command to disable the DoS prevention mechanism for all supported types. All the
related settings will be reverted back to the default for the specified attack types.
The following well-known DoS types which can be detected by most switches:
Blat
- This type of attack will send packets with TCP/UDP source port equals to destination port to the
target device. It may cause the target device respond to itself.
Land
-
A LAND attack involves with IP packets where the source and destination address are set to
address of the target device. It may cause the target device reply to itself continuously.
TCP-NULL-scan
: Port scanning by using specific packets, which contain a sequence number of 0 and no
flags.
TCP-SYN-fin
- Port scanning by using specific packets, which contain SYN and FIN flags.
TCP-SYN-SRCport-less-1024
: Port scanning by using specific packets, which contain source port 0-1023
and SYN flag.
TCP-xmas-scan
- Port scanning by using specific packets, which contain a sequence number of 0 and the
Urgent (URG), Push (PSH), and FIN flags.
Ping-death
- A ping of death is a type of attack on a computer that involves sending a malformed or
otherwise malicious ping to a computer. A ping is normally 64 bytes in size; many computers cannot
handle a ping larger than the maximum IP packet size, which is 65,535 bytes. Sending a ping of this size
can crash the target computer. Traditionally, this bug has been relatively easy to exploit. Generally,
sending a 65536 byte ping packet is illegal according to networking protocol, but a packet of such a size
can be sent if it is fragmented; when the target computer reassembles the packet, a buffer overflow can
occur, which often cause a system crash.
TCP-tiny-frag
- Tiny TCP Fragment attacker uses the IP fragmentation to create extremely small
fragments and force the TCP header information into a separate packet fragment to pass through the
check function of the router and issue an attack.
Smurf
- Attacker sends a large amount of ICMP request packets to IP broadcast address, the source IP
address of the attacking packets equals to the victim’s IP address. If the router delivers traffic to the IP
broadcast address, all hosts in that IP network will reply ICMP to the victim's IP address.
tcp-syn-rst
- A TCP packet with the TCP SYN and RST flags which are both illegal and potentially a
security threat.
All
- All of above types.