Netgear GS724Tv4 Software Administration Manual - Page 47

Con Denial of Service, Denial of Service TCP FIN&URG&PSH

Page 47 highlights

GS716Tv3, GS724Tv4, and GS748Tv5 Smart Switches Configure Denial of Service The Denial of Service Configuration screen allows you to select which types of DoS attacks the switch monitors and blocks.  To configure individual DoS settings: 1. Select System > Management > Denial of Service > Denial of Service Configuration. 2. Select the types of DoS attacks for the switch to monitor and block and configure any associated values: • Denial of Service Min TCP Header Size. Specify the minimum TCP header size allowed. If DoS TCP Fragment is enabled, the switch will drop packets that have a TCP header smaller than the configured value. • Denial of Service ICMPv4. Enabling ICMPv4 DoS prevention causes the switch to drop ICMPv4 packets that have a type set to ECHO_REQ (ping) and a size greater than the configured ICMPv4 packet size. The factory default is disabled. • Denial of Service Max ICMPv4 Packet Size. Specify the maximum ICMPv4 packet size allowed. If ICMPv4 DoS prevention is enabled, the switch will drop IPv4 ICMP ping packets that have a size greater than the configured value. • Denial of Service ICMPv6. Enabling ICMPv6 DoS prevention causes the switch to drop ICMPv6 packets that have a type set to ECHO_REQ (ping) and a size greater than the configured ICMPv6 packet size. • Denial of Service Max ICMPv6 Packet Size. Specify the maximum IPv6 ICMP packet size allowed. If ICMPv6 DoS prevention is enabled, the switch will drop IPv6 ICMP ping packets that have a size greater than this configured maximum ICMPv6 packet size. • Denial of Service First Fragment. Enabling First Fragment DoS prevention causes the switch to check DoS options on first fragment IP packets when switch are receiving fragmented IP packets. Otherwise, the switch ignores the first fragment IP packages. • Denial of Service ICMP Fragment. Enabling ICMP Fragment DoS prevention causes the switch to drop ICMP fragmented packets. • Denial of Service SIP=DIP. Enabling SIP=DIP DoS prevention causes the switch to drop packets that have a source IP address equal to the destination IP address. • Denial of Service SMAC=DMAC. Enabling SMAC=DMAC DoS prevention causes the switch to drop packets that have a source MAC address equal to the destination MAC address. • Denial of Service TCP FIN&URG&PSH. Enabling TCP FIN & URG & PSH DoS prevention causes the switch to drop packets that have TCP Flags FIN, URG, and PSH set and TCP sequence number equal to 0. • Denial of Service TCP Flag&Sequence. Enabling TCP Flag DoS prevention causes the switch to drop packets that have TCP control flags set to 0 and TCP sequence number set to 0. • Denial of Service TCP Fragment. Enabling TCP Fragment DoS prevention causes the switch to drop packets that have a TCP payload where the IP payload length minus the IP header size is less than the minimum allowed TCP header size. Configure System Information 47

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290

Configure System Information
47
GS716Tv3, GS724Tv4, and GS748Tv5 Smart Switches
Configure Denial of Service
The
Denial of Service Configuration
screen allows you to select which types of DoS attacks
the switch monitors and blocks.
To configure individual DoS settings:
1.
Select
System
>
Management
>
Denial of Service
>
Denial of Service Configuration
.
2.
Select the types of DoS attacks for the switch to monitor and block and configure any
associated values:
Denial of Service Min TCP Header Size
. Specify the minimum TCP header size
allowed. If DoS TCP Fragment is enabled, the switch will drop packets that have a
TCP header smaller than the configured value.
Denial of Service ICMPv4
. Enabling ICMPv4 DoS prevention causes the switch to
drop ICMPv4 packets that have a type set to ECHO_REQ (ping) and a size greater
than the configured ICMPv4 packet size. The factory default is disabled.
Denial of Service Max ICMPv4 Packet Size
. Specify the maximum ICMPv4 packet
size allowed. If ICMPv4 DoS prevention is enabled, the switch will drop IPv4 ICMP
ping packets that have a size greater than the configured value.
Denial of Service ICMPv6
. Enabling ICMPv6 DoS prevention causes the switch to
drop ICMPv6 packets that have a type set to ECHO_REQ (ping) and a size greater
than the configured ICMPv6 packet size.
Denial of Service Max ICMPv6 Packet Size
. Specify the maximum IPv6 ICMP
packet size allowed. If ICMPv6 DoS prevention is enabled, the switch will drop IPv6
ICMP ping packets that have a size greater than this configured maximum ICMPv6
packet size.
Denial of Service First Fragment
. Enabling First Fragment DoS prevention causes
the switch to check DoS options on first fragment IP packets when switch are
receiving fragmented IP packets. Otherwise, the switch ignores the first fragment IP
packages.
Denial of Service ICMP Fragment
. Enabling ICMP Fragment DoS prevention
causes the switch to drop ICMP fragmented packets.
Denial of Service SIP=DIP
. Enabling SIP=DIP DoS prevention causes the switch to
drop packets that have a source IP address equal to the destination IP address.
Denial of Service SMAC=DMAC
. Enabling SMAC=DMAC DoS prevention causes
the switch to drop packets that have a source MAC address equal to the destination
MAC address.
Denial of Service TCP FIN&URG&PSH
. Enabling TCP FIN & URG & PSH DoS
prevention causes the switch to drop packets that have TCP Flags FIN, URG, and
PSH set and TCP sequence number equal to 0.
Denial of Service TCP Flag&Sequence
. Enabling TCP Flag DoS prevention causes
the switch to drop packets that have TCP control flags set to 0 and TCP sequence
number set to 0.
Denial of Service TCP Fragment
. Enabling TCP Fragment DoS prevention causes
the switch to drop packets that have a TCP payload where the IP payload length
minus the IP header size is less than the minimum allowed TCP header size.