<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Recommended values for synflood and rate limiting in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/recommended-values-for-synflood-and-rate-limiting/m-p/5216417#M592746</link>
    <description>&lt;P&gt;Quite dissapointed that this post was done way back in 2019 with no answer other than "be careful".&amp;nbsp; I am also in the process if hardening our ISE environment and there is no requirement within our guidelines other than it needs to be set.&lt;/P&gt;</description>
    <pubDate>Mon, 28 Oct 2024 19:58:28 GMT</pubDate>
    <dc:creator>DurzoBlint</dc:creator>
    <dc:date>2024-10-28T19:58:28Z</dc:date>
    <item>
      <title>Recommended values for synflood and rate limiting</title>
      <link>https://community.cisco.com/t5/network-access-control/recommended-values-for-synflood-and-rate-limiting/m-p/3563387#M496919</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi community,&lt;/P&gt;&lt;P&gt;I have two questions regarding the ISE CLI commands &lt;STRONG style="font-size: 13.3333px;"&gt;synflood-limit&lt;/STRONG&gt;&lt;SPAN style="font-size: 13.3333px;"&gt; and &lt;/SPAN&gt;&lt;STRONG style="font-size: 13.3333px;"&gt;rate-limit:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;I do understand the use case for &lt;STRONG style="font-size: 10pt;"&gt;synflood-limit&lt;/STRONG&gt;&lt;SPAN style="font-size: 10pt;"&gt; since a high number of TCP-SYN is a clear indication for a malicious attack. But what about the use case for &lt;STRONG&gt;rate-limit&lt;/STRONG&gt;? ISE inter-node communication? Communication with integrated 3rd party devices (for example through pxgrid)? Or even access to the ISE portals (Guest, Sponsor...)? I would appreciate if someone shed some light on this.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;And finally I am looking for recommended values for the &lt;STRONG&gt;synflood-limit&lt;/STRONG&gt; and &lt;STRONG&gt;rate-limit &lt;/STRONG&gt;commands (in terms of packets per second). In other words: are there any guidelines on how to avoid an impact on ISE operations.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Jun 2018 13:46:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/recommended-values-for-synflood-and-rate-limiting/m-p/3563387#M496919</guid>
      <dc:creator>JP_Berlin</dc:creator>
      <dc:date>2018-06-18T13:46:43Z</dc:date>
    </item>
    <item>
      <title>Re: Recommended values for synflood and rate limiting</title>
      <link>https://community.cisco.com/t5/network-access-control/recommended-values-for-synflood-and-rate-limiting/m-p/3563388#M496920</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Such settings could impact authentication TPS; especially EAP-TLS. Please use them with cautions.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The command synflood-limit takes only a numeric value as the argument so it applies to all TCP attempts. A similar command "conn-limit" takes ip and port arguments so give us more choices if we are to implement sync flood protection on TCP connections. The other command "rate-limit" also take ip and port arguments but it applies to all TCP/UDP/ICMP.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Jun 2018 04:33:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/recommended-values-for-synflood-and-rate-limiting/m-p/3563388#M496920</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-06-19T04:33:36Z</dc:date>
    </item>
    <item>
      <title>Re: Recommended values for synflood and rate limiting</title>
      <link>https://community.cisco.com/t5/network-access-control/recommended-values-for-synflood-and-rate-limiting/m-p/3947480#M496921</link>
      <description>&lt;P&gt;Hello, hslai&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would like to know if maybe you know what is it the recommended rate for configuring with the command "rate-limit" for TCP/UDP/ICMP.&amp;nbsp; Right now I'm hardening an ISE deployment, and I've been following this guide &lt;A href="https://community.cisco.com/t5/security-documents/ise-security-best-practices-hardening/ta-p/3640651" target="_blank"&gt;https://community.cisco.com/t5/security-documents/ise-security-best-practices-hardening/ta-p/3640651&lt;/A&gt; but I don't know what value the rate limit has to take.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you so much in advance.&lt;/P&gt;</description>
      <pubDate>Thu, 24 Oct 2019 17:04:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/recommended-values-for-synflood-and-rate-limiting/m-p/3947480#M496921</guid>
      <dc:creator>drivera_</dc:creator>
      <dc:date>2019-10-24T17:04:48Z</dc:date>
    </item>
    <item>
      <title>Re: Recommended values for synflood and rate limiting</title>
      <link>https://community.cisco.com/t5/network-access-control/recommended-values-for-synflood-and-rate-limiting/m-p/5216417#M592746</link>
      <description>&lt;P&gt;Quite dissapointed that this post was done way back in 2019 with no answer other than "be careful".&amp;nbsp; I am also in the process if hardening our ISE environment and there is no requirement within our guidelines other than it needs to be set.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Oct 2024 19:58:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/recommended-values-for-synflood-and-rate-limiting/m-p/5216417#M592746</guid>
      <dc:creator>DurzoBlint</dc:creator>
      <dc:date>2024-10-28T19:58:28Z</dc:date>
    </item>
    <item>
      <title>Re: Recommended values for synflood and rate limiting</title>
      <link>https://community.cisco.com/t5/network-access-control/recommended-values-for-synflood-and-rate-limiting/m-p/5216449#M592748</link>
      <description>&lt;P&gt;I agree that the feature could be explained a bit more in detail - I have never touched those values, but only because I don't know what a reasonable value is.&amp;nbsp; When comparing to switch feature Broadcast/Multicast Storm protection, I once had bad experience by setting a threshold value too low, that caused legitimate multicast traffic to err-disable a switch port. That's why the phrase "be careful" is quite apt, in my opinion.&amp;nbsp; There is no golden value to set this at.&lt;/P&gt;
&lt;P&gt;The ultimate test would be to throw some SYN floods at ISE, using a packet generator, to see what happens. Cisco has the T-Rex which you could install on a separate host and then throw some SYN packets at ISE. If you're more comfortable in Windows, &lt;A href="https://ostinato.org/" target="_self"&gt;Ostinato is a great tool&lt;/A&gt; - I think it also has a trial period.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Oct 2024 20:37:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/recommended-values-for-synflood-and-rate-limiting/m-p/5216449#M592748</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-10-28T20:37:48Z</dc:date>
    </item>
    <item>
      <title>Re: Recommended values for synflood and rate limiting</title>
      <link>https://community.cisco.com/t5/network-access-control/recommended-values-for-synflood-and-rate-limiting/m-p/5216482#M592755</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;Such values (including&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/158532"&gt;@Arne Bier&lt;/a&gt;&amp;nbsp;mentioned storm-control values) are specific to each environment, there is NO good value, there is NO recommended value, there is just a working value which is specific to each environment and can only be validated during some sort of trial &amp;amp; error once infra is in its final state; in general, when setting these values, as you want to avoid total failure, you take into account worst-case scenario, like for example when all devices would need to speak with ISE at ~ the same time.&lt;/P&gt;
&lt;P&gt;Best,&lt;/P&gt;
&lt;P&gt;Cristian.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Oct 2024 22:33:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/recommended-values-for-synflood-and-rate-limiting/m-p/5216482#M592755</guid>
      <dc:creator>Cristian Matei</dc:creator>
      <dc:date>2024-10-28T22:33:35Z</dc:date>
    </item>
  </channel>
</rss>

