Netgear M5300-52G3 Web Management User Guide - Page 383

Denial of Service TCP FIN & URG & PSH, Denial of Service TCP SYN & FIN

Page 383 highlights

ProSafe M5300 Switch 3. Use Denial of Service Max ICMP Packet Size to specify the Max ICMPv4 Packet Size allowed (This includes the ICMP header size of 8 bytes). If ICMP DoS prevention is enabled, the switch will drop ICMP ping packets that have a size greater then this configured Max ICMP Packet Size minus the ICMP header size of 8 bytes. The factory default is 512. 4. Use Denial of Service ICMPv6 to enable ICMPv6 DoS prevention causing the switch to drop ICMP packets that have a type set to ECHO_REQ (ping) and a size greater than the configured ICMP Pkt Size. The factory default is disabled. 5. Use Denial of Service Max ICMPv6 Packet Size to specify the Max ICMPv4 Packet Size allowed (This includes the ICMP header size of 8 bytes). If ICMP DoS prevention is enabled, the switch will drop ICMP ping packets that have a size greater then this configured Max ICMP Packet Size minus the ICMP header size of 8 bytes. The factory default is 512. 6. Use Denial of Service First Fragment to enable First Fragment DoS prevention causing the switch to check DoS options on first fragment IP packets when switch are receiving fragmented IP packets. Otherwise, switch ignores the first fragment IP packages. The factory default is disabled. 7. Use Denial of Service ICMP Fragment to cause the switch to drop ICMP Fragmented packets. The factory default is disabled. 8. Use Denial of Service SIP=DIP to enable SIP=DIP DoS prevention causing the switch to drop packets that have a source IP address equal to the destination IP address. The factory default is disabled. 9. Enable Denial of Service SMAC=DMAC to cause the switch to drop packets where the source MAC address = Destination MAC address. 10. Enable Denial of Service TCP FIN & URG & PSH to cause the switch to crop packets where the TCP Flags FIN and URG and PSH set and TCP Sequence Number = 0. 11. Enable Denial of Service TCP Flag & Sequence to cause the switch to drop packets where the TCP Flag SYN set and Source Port < 1024 or TCP Control Flags = 0 and TCP Sequence Number = 0 or TCP Flags FIN, URG, and PSH set and TCP Sequence Number = 0 or TCP Flags SYN and FIN set. 12. Enable Denial of Service TCP Fragment to allow the switch to drop packets that have a TCP payload where the IP payload length minus the IP header size is less than the minimum allowed TCP header size.The factory default is disabled. 13. Enable Denial of Service TCP Offset to cause the switch to drop packets where the TCP Header Offset = 1. 14. Enable Denial of Service TCP Port to cause the switch to drop packets where the TCP source port equal to TCP destination port. The factory default is disabled. 15. Enable Denial of Service TCP SYN to cause the switch to drop packets where the TCP Flag SYN set. 16. Enable Denial of Service TCP SYN & FIN to cause the switch to drop packets where the TCP Flags SYN and FIN set. 17. Enable Denial of Service UDP Port to cause the switch to drop packets that have UDP source port equal to UDP destination port. The factory default is disabled. 18. Click APPLY to update the switch with the new settings. 19. CLick CANCEL to abandon the changes. Managing Device Security 383

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442
  • 443
  • 444
  • 445
  • 446
  • 447
  • 448
  • 449
  • 450
  • 451
  • 452
  • 453
  • 454
  • 455
  • 456
  • 457
  • 458
  • 459
  • 460
  • 461
  • 462
  • 463
  • 464
  • 465
  • 466
  • 467
  • 468
  • 469
  • 470
  • 471
  • 472
  • 473
  • 474
  • 475
  • 476
  • 477
  • 478
  • 479
  • 480
  • 481
  • 482
  • 483
  • 484
  • 485
  • 486
  • 487
  • 488
  • 489
  • 490
  • 491
  • 492
  • 493
  • 494
  • 495
  • 496
  • 497
  • 498
  • 499
  • 500
  • 501
  • 502
  • 503
  • 504
  • 505
  • 506
  • 507
  • 508
  • 509
  • 510
  • 511
  • 512
  • 513
  • 514
  • 515
  • 516
  • 517
  • 518
  • 519
  • 520
  • 521
  • 522
  • 523
  • 524
  • 525
  • 526
  • 527
  • 528
  • 529
  • 530

Managing Device Security
383
ProSafe M5300 Switch
3.
Use
Denial of Service Max ICMP Packet Size
to specify the Max ICMPv4 Packet Size
allowed (This includes the ICMP header size of 8 bytes). If ICMP DoS prevention is enabled,
the switch will drop ICMP ping packets that have a size greater then this configured Max
ICMP Packet Size minus the ICMP header size of 8 bytes. The factory default is 512.
4.
Use
Denial of Service ICMPv6
to enable ICMPv6 DoS prevention causing the switch to
drop ICMP packets that have a type set to ECHO_REQ (ping) and a size greater than the
configured ICMP Pkt Size. The factory default is disabled.
5.
Use
Denial of Service Max ICMPv6 Packet Size
to specify the Max ICMPv4 Packet Size
allowed (This includes the ICMP header size of 8 bytes). If ICMP DoS prevention is enabled,
the switch will drop ICMP ping packets that have a size greater then this configured Max
ICMP Packet Size minus the ICMP header size of 8 bytes. The factory default is 512.
6.
Use
Denial of Service First Fragment
to enable First Fragment DoS prevention causing
the switch to check DoS options on first fragment IP packets when switch are receiving
fragmented IP packets. Otherwise, switch ignores the first fragment IP packages. The
factory default is disabled.
7.
Use
Denial of Service ICMP Fragment
to cause the switch to drop ICMP Fragmented
packets. The factory default is disabled.
8.
Use
Denial of Service SIP=DIP
to enable SIP=DIP DoS prevention causing the switch to
drop packets that have a source IP address equal to the destination IP address. The factory
default is disabled.
9.
Enable
Denial of Service SMAC=DMAC
to cause the switch to drop packets where the
source MAC address = Destination MAC address.
10.
Enable
Denial of Service TCP FIN & URG & PSH
to cause the switch to crop packets
where the TCP Flags FIN and URG and PSH set and TCP Sequence Number = 0.
11.
Enable
Denial of Service TCP Flag & Sequence
to cause the switch to drop packets
where the TCP Flag SYN set and Source Port < 1024 or TCP Control Flags = 0 and TCP
Sequence Number = 0 or TCP Flags FIN, URG, and PSH set and TCP Sequence Number
= 0 or TCP Flags SYN and FIN set.
12.
Enable
Denial of Service TCP Fragment
to allow the switch to drop packets that have a
TCP payload where the IP payload length minus the IP header size is less than the
minimum allowed TCP header size.The factory default is disabled.
13.
Enable
Denial of Service TCP Offset
to cause the switch to drop packets where the TCP
Header Offset = 1.
14.
Enable
Denial of Service TCP Port
to cause the switch to drop packets where the TCP
source port equal to TCP destination port. The factory default is disabled.
15.
Enable
Denial of Service TCP SYN
to cause the switch to drop packets where the TCP
Flag SYN set.
16.
Enable
Denial of Service TCP SYN & FIN
to cause the switch to drop packets where the
TCP Flags SYN and FIN set.
17.
Enable
Denial of Service UDP Port
to cause the switch to drop packets that have UDP
source port equal to UDP destination port. The factory default is disabled.
18.
Click
APPLY
to update the switch with the new settings.
19.
CLick
CANCEL
to abandon the changes.