<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PIX501 - Preventing Outbound DOS Attack in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix501-preventing-outbound-dos-attack/m-p/673151#M1036949</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What you can do is to implement RFC2827 on your Internet router's (apply ACL on serial link facing ISP) or alternatively on PIX's Outside interface.&lt;/P&gt;&lt;P&gt;Router is more recommended as ot will be the device to filter inbound/outbound traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Detecting DOS attack using PIX501 is very limited. It normally taken care by IPS/IDS/router (using CAR/rate limit &amp;amp; RFC2827). But you can configure RFC2827 to always deny it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Minimum Action (more can be done with different devices/methods):&lt;/P&gt;&lt;P&gt;- Permit your Public IP Range to go out to serial interface to ISP&lt;/P&gt;&lt;P&gt;- Deny other public IPs to go out to serial interface to ISP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;a. On PIX, &lt;/P&gt;&lt;P&gt;- Enable anti spoofing using "ip verify reverse-path" on Outside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  Firewall(config)# ip verify reverse-path interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;b. On your router (RFC2827), create and apply ACL to the serial interface facing ISP:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Example, if your Public IP Range assigned by ISP is 100.100.100.0/24, you need to permit only this Public IP going out from your network. Deny others.&lt;/P&gt;&lt;P&gt;On ISP end (pre-arrange with them), they will deny your own Public IP range from going back to your own network from ISP end.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Your internet router (facing ISP):&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface serial0/0&lt;/P&gt;&lt;P&gt; ip add xx.xx.xx.2 255.255.255.252&lt;/P&gt;&lt;P&gt; ip access-group 100 out&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list 100 permit ip 100.100.100.0 0.0.0.255 any ---&amp;gt; permit your public IP going out to ISP/internet&lt;/P&gt;&lt;P&gt;access-list 100 deny ip any any --&amp;gt; deny other Public IPs from going out/originating from your network&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/netsol/ns340/ns394/ns171/ns128/networking_solutions_white_paper09186a00804cc4fa.shtml" target="_blank"&gt;http://www.cisco.com/en/US/netsol/ns340/ns394/ns171/ns128/networking_solutions_white_paper09186a00804cc4fa.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.ietf.org/rfc/rfc2827.txt" target="_blank"&gt;http://www.ietf.org/rfc/rfc2827.txt&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;AK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 08 Dec 2006 04:17:37 GMT</pubDate>
    <dc:creator>a.kiprawih</dc:creator>
    <dc:date>2006-12-08T04:17:37Z</dc:date>
    <item>
      <title>PIX501 - Preventing Outbound DOS Attack</title>
      <link>https://community.cisco.com/t5/network-security/pix501-preventing-outbound-dos-attack/m-p/673150#M1036936</link>
      <description>&lt;P&gt;Earlier this week our ISP shut us down for a while. They claimed that a DOS attack had come from within our network. I run Symantec Corp AV on all computers and everything is up to date. The majority of users are not administrators on the local machine. As a result of the incident, I have turned on logging and am using Kiwi Syslog Daemon to receive the data.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyhow, is there a way with the PIX501 to detect an outbound DOS attack? I have searched the net and the PIX configuration and command manuals. I really haven't found anything that suggests the PIX501 is capable of detecting such an occurrence. Does anyone have any thoughts on this issue? Thank you.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 09:05:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix501-preventing-outbound-dos-attack/m-p/673150#M1036936</guid>
      <dc:creator>evitalcom</dc:creator>
      <dc:date>2019-03-11T09:05:46Z</dc:date>
    </item>
    <item>
      <title>Re: PIX501 - Preventing Outbound DOS Attack</title>
      <link>https://community.cisco.com/t5/network-security/pix501-preventing-outbound-dos-attack/m-p/673151#M1036949</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What you can do is to implement RFC2827 on your Internet router's (apply ACL on serial link facing ISP) or alternatively on PIX's Outside interface.&lt;/P&gt;&lt;P&gt;Router is more recommended as ot will be the device to filter inbound/outbound traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Detecting DOS attack using PIX501 is very limited. It normally taken care by IPS/IDS/router (using CAR/rate limit &amp;amp; RFC2827). But you can configure RFC2827 to always deny it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Minimum Action (more can be done with different devices/methods):&lt;/P&gt;&lt;P&gt;- Permit your Public IP Range to go out to serial interface to ISP&lt;/P&gt;&lt;P&gt;- Deny other public IPs to go out to serial interface to ISP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;a. On PIX, &lt;/P&gt;&lt;P&gt;- Enable anti spoofing using "ip verify reverse-path" on Outside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  Firewall(config)# ip verify reverse-path interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;b. On your router (RFC2827), create and apply ACL to the serial interface facing ISP:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Example, if your Public IP Range assigned by ISP is 100.100.100.0/24, you need to permit only this Public IP going out from your network. Deny others.&lt;/P&gt;&lt;P&gt;On ISP end (pre-arrange with them), they will deny your own Public IP range from going back to your own network from ISP end.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Your internet router (facing ISP):&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface serial0/0&lt;/P&gt;&lt;P&gt; ip add xx.xx.xx.2 255.255.255.252&lt;/P&gt;&lt;P&gt; ip access-group 100 out&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list 100 permit ip 100.100.100.0 0.0.0.255 any ---&amp;gt; permit your public IP going out to ISP/internet&lt;/P&gt;&lt;P&gt;access-list 100 deny ip any any --&amp;gt; deny other Public IPs from going out/originating from your network&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/netsol/ns340/ns394/ns171/ns128/networking_solutions_white_paper09186a00804cc4fa.shtml" target="_blank"&gt;http://www.cisco.com/en/US/netsol/ns340/ns394/ns171/ns128/networking_solutions_white_paper09186a00804cc4fa.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.ietf.org/rfc/rfc2827.txt" target="_blank"&gt;http://www.ietf.org/rfc/rfc2827.txt&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;AK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Dec 2006 04:17:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix501-preventing-outbound-dos-attack/m-p/673151#M1036949</guid>
      <dc:creator>a.kiprawih</dc:creator>
      <dc:date>2006-12-08T04:17:37Z</dc:date>
    </item>
    <item>
      <title>Re: PIX501 - Preventing Outbound DOS Attack</title>
      <link>https://community.cisco.com/t5/network-security/pix501-preventing-outbound-dos-attack/m-p/673152#M1036978</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also, if required, enable PIX's anti spoofing on Inside interface as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Firewall(config)# ip verify reverse-path interface inside &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Dec 2006 04:19:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix501-preventing-outbound-dos-attack/m-p/673152#M1036978</guid>
      <dc:creator>a.kiprawih</dc:creator>
      <dc:date>2006-12-08T04:19:38Z</dc:date>
    </item>
    <item>
      <title>Re: PIX501 - Preventing Outbound DOS Attack</title>
      <link>https://community.cisco.com/t5/network-security/pix501-preventing-outbound-dos-attack/m-p/673153#M1036995</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for the reply AK. My search of the manuals did not include the keyword "spoof". I might have been been lost even if I had done so! There is no router, only the PIX501 connected to the cable modem. The commands presently include the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip address outside xxx.xxx.xxx.xx6 255.255.255.224&lt;/P&gt;&lt;P&gt;ip address inside 192.168.21.1 255.255.255.0&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 xxx.xxx.xxx.xx5 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I plan to add the following commands per your recommendation:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface outside&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My only question now is do I need to issue a route command on the inside interface? If so, would the following be correct given the above information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route inside 192.168.21.0 255.255.255.0 192.168.21.1 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you verify?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And many thanks for the link to the Cisco SAFE Blueprint. There is much to be learned from that document!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Dec 2006 09:21:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix501-preventing-outbound-dos-attack/m-p/673153#M1036995</guid>
      <dc:creator>evitalcom</dc:creator>
      <dc:date>2006-12-08T09:21:54Z</dc:date>
    </item>
    <item>
      <title>Re: PIX501 - Preventing Outbound DOS Attack</title>
      <link>https://community.cisco.com/t5/network-security/pix501-preventing-outbound-dos-attack/m-p/673154#M1037012</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;YOu don't have to specify that static route. PIX will automatically handle it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You need to do it only, for example if your Inside interface is connected to a L3 device like L3 switch or router that host the 192.168.21.0/24. Meaning that your inside interface is running on differen t subnet. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Static route is needed tell PIX that to reach that segemnt, you need to route or ask the L3 device that has that segment.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;AK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Dec 2006 10:18:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix501-preventing-outbound-dos-attack/m-p/673154#M1037012</guid>
      <dc:creator>a.kiprawih</dc:creator>
      <dc:date>2006-12-08T10:18:10Z</dc:date>
    </item>
  </channel>
</rss>

