<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic SYN attack in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/syn-attack/m-p/1829602#M492361</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;can we apply embryonic connection for particular acess-list&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 29 Nov 2011 06:58:58 GMT</pubDate>
    <dc:creator>prashantrecon</dc:creator>
    <dc:date>2011-11-29T06:58:58Z</dc:date>
    <item>
      <title>SYN attack</title>
      <link>https://community.cisco.com/t5/network-security/syn-attack/m-p/1829597#M492346</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have router and inside interface is connected to firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Last week i had attack one of my internal server&amp;nbsp; and i also loosing connectivity to inside interface of the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But today suddenly internet was down when checked link was up but i&amp;nbsp; also not able to ping to router inerface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When checked in firewall there was a log indicating SYN attack but source and destination ip was not mentioned.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can anybody suggest.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:55:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/syn-attack/m-p/1829597#M492346</guid>
      <dc:creator>prashantrecon</dc:creator>
      <dc:date>2019-03-11T21:55:50Z</dc:date>
    </item>
    <item>
      <title>SYN attack</title>
      <link>https://community.cisco.com/t5/network-security/syn-attack/m-p/1829598#M492348</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;A SYN attack is most likely spoofed SYN packets.&lt;/P&gt;&lt;P&gt;That means that it is not the real address sending them and that the ip address contained within the packet is not correct.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;it seems like there is someone having it in for you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Good luck&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Nov 2011 07:37:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/syn-attack/m-p/1829598#M492348</guid>
      <dc:creator>hobbe</dc:creator>
      <dc:date>2011-11-28T07:37:50Z</dc:date>
    </item>
    <item>
      <title>SYN attack</title>
      <link>https://community.cisco.com/t5/network-security/syn-attack/m-p/1829599#M492352</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there any way to prevent attack on routers.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Nov 2011 07:39:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/syn-attack/m-p/1829599#M492352</guid>
      <dc:creator>prashantrecon</dc:creator>
      <dc:date>2011-11-28T07:39:27Z</dc:date>
    </item>
    <item>
      <title>Re: SYN attack</title>
      <link>https://community.cisco.com/t5/network-security/syn-attack/m-p/1829600#M492355</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Prevent the attack itself ?&lt;/P&gt;&lt;P&gt;No&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mitigate the impact on services ?&lt;/P&gt;&lt;P&gt;to some extent yes. read the link below&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The agressor can always oversaturate your internetlink.&lt;/P&gt;&lt;P&gt;It is just a numbers game, a SYN packet size is X your link has size Y and can traverse Z packets per second.&lt;/P&gt;&lt;P&gt;Then the agressor just needs to send enough syn packets through to eat up the resources of Y or Z wichever comes first.&lt;/P&gt;&lt;P&gt;However that is not the normal way of using syn attacks since there are faster ways to oversaturate the link.&lt;/P&gt;&lt;P&gt;the normal way of using syn attacks is to steal resources away from the server that is under attack by not establishing a full tcp connection.&lt;/P&gt;&lt;P&gt;This is mitigated in the firewall who sits inbetween the agressor and the server and answers the Syn packets and only lets through the ones that are legit.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_9-4/syn_flooding_attacks.html"&gt;http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_9-4/syn_flooding_attacks.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Good luck&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Nov 2011 07:54:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/syn-attack/m-p/1829600#M492355</guid>
      <dc:creator>hobbe</dc:creator>
      <dc:date>2011-11-28T07:54:40Z</dc:date>
    </item>
    <item>
      <title>SYN attack</title>
      <link>https://community.cisco.com/t5/network-security/syn-attack/m-p/1829601#M492358</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a00809763ea.shtml#tcp&lt;/P&gt;&lt;P&gt;This might help you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;---&lt;/P&gt;&lt;P&gt;Posted by WebUser &lt;A href="http://www.facebook.com/profile.php?id=100000148906968"&gt;Sooraj Prasad&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 Nov 2011 05:32:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/syn-attack/m-p/1829601#M492358</guid>
      <dc:creator>fb_webuser</dc:creator>
      <dc:date>2011-11-29T05:32:42Z</dc:date>
    </item>
    <item>
      <title>SYN attack</title>
      <link>https://community.cisco.com/t5/network-security/syn-attack/m-p/1829602#M492361</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;can we apply embryonic connection for particular acess-list&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 Nov 2011 06:58:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/syn-attack/m-p/1829602#M492361</guid>
      <dc:creator>prashantrecon</dc:creator>
      <dc:date>2011-11-29T06:58:58Z</dc:date>
    </item>
  </channel>
</rss>

