<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Suspected DDoS SYN-Flood attack in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/suspected-ddos-syn-flood-attack/m-p/1672391#M536853</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On ASA access rules, SSH is opened for the inside server from outside IPs? If so, is it restricted? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;please see the below link that might provide some helpful information.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a00809763ea.shtml"&gt;http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a00809763ea.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hth&lt;/P&gt;&lt;P&gt;MS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 30 Jun 2011 16:06:16 GMT</pubDate>
    <dc:creator>mvsheik123</dc:creator>
    <dc:date>2011-06-30T16:06:16Z</dc:date>
    <item>
      <title>Suspected DDoS SYN-Flood attack</title>
      <link>https://community.cisco.com/t5/network-security/suspected-ddos-syn-flood-attack/m-p/1672390#M536852</link>
      <description>&lt;P&gt;ASA5520 v8.3(2) OS&lt;/P&gt;&lt;P&gt;I'm seeing connection bursts every 2 minutes to my internal SSH server&lt;/P&gt;&lt;P&gt;Conns during that time peak at &amp;gt; 1500/sec - normal is 100/sec&lt;/P&gt;&lt;P&gt;Inbound bandwidth usage goes from 4Mbit/sec to &amp;gt; 30Mbit/sec&lt;/P&gt;&lt;P&gt;CPU usage spikes above 60%&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I do a "show conn' the oustanding type looks like:&lt;/P&gt;&lt;P&gt;TCP outside AA.BB.CC.DD:11510 inside XXX.YYY.XXX.ZZZ:22, idle 0:00:00, bytes 0, flags aB&lt;/P&gt;&lt;P&gt;Note the 'bytes 0, flags aB'&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What do I need to do to mitigate this?&amp;nbsp; I don't have an AIP-SSC in the 5520.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thx&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 20:53:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/suspected-ddos-syn-flood-attack/m-p/1672390#M536852</guid>
      <dc:creator>Phil Williamson</dc:creator>
      <dc:date>2019-03-11T20:53:23Z</dc:date>
    </item>
    <item>
      <title>Suspected DDoS SYN-Flood attack</title>
      <link>https://community.cisco.com/t5/network-security/suspected-ddos-syn-flood-attack/m-p/1672391#M536853</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On ASA access rules, SSH is opened for the inside server from outside IPs? If so, is it restricted? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;please see the below link that might provide some helpful information.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a00809763ea.shtml"&gt;http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a00809763ea.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hth&lt;/P&gt;&lt;P&gt;MS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Jun 2011 16:06:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/suspected-ddos-syn-flood-attack/m-p/1672391#M536853</guid>
      <dc:creator>mvsheik123</dc:creator>
      <dc:date>2011-06-30T16:06:16Z</dc:date>
    </item>
    <item>
      <title>Suspected DDoS SYN-Flood attack</title>
      <link>https://community.cisco.com/t5/network-security/suspected-ddos-syn-flood-attack/m-p/1672392#M536854</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, this is an unrestriced server.&lt;/P&gt;&lt;P&gt;I've tried the code in that link, previously and it does not seem to make any difference.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thoughts?&lt;/P&gt;&lt;P&gt;Thx&lt;/P&gt;&lt;P&gt;PW&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Jun 2011 16:26:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/suspected-ddos-syn-flood-attack/m-p/1672392#M536854</guid>
      <dc:creator>Phil Williamson</dc:creator>
      <dc:date>2011-06-30T16:26:41Z</dc:date>
    </item>
    <item>
      <title>Suspected DDoS SYN-Flood attack</title>
      <link>https://community.cisco.com/t5/network-security/suspected-ddos-syn-flood-attack/m-p/1672393#M536855</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Nope...;-) but I would move the server to DMZ, if possible. Also try clear the xlate for the server and see if that helps anything.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thx&lt;/P&gt;&lt;P&gt;MS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Jun 2011 16:41:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/suspected-ddos-syn-flood-attack/m-p/1672393#M536855</guid>
      <dc:creator>mvsheik123</dc:creator>
      <dc:date>2011-06-30T16:41:59Z</dc:date>
    </item>
    <item>
      <title>Suspected DDoS SYN-Flood attack</title>
      <link>https://community.cisco.com/t5/network-security/suspected-ddos-syn-flood-attack/m-p/1672394#M536856</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; It is basically in a DMZ since it's the ony server behind the ASA.&lt;/P&gt;&lt;P&gt;Can't clear xlates - would being down 2K+ legit connections.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did make a few changes to the code in your link:&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map TCP_SYN&lt;/P&gt;&lt;P&gt; match port tcp eq ssh&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map TCPMAP&lt;/P&gt;&lt;P&gt; class TCP_SYN&lt;/P&gt;&lt;P&gt;&amp;nbsp; set connection conn-max 10000 embryonic-conn-max 200 per-client-max 25 per-client-embryonic-max 5&lt;/P&gt;&lt;P&gt;&amp;nbsp; set connection timeout half-closed 0:05:00 idle 1:00:00&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy TCPMAP interface outside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Questions:&lt;/P&gt;&lt;P&gt;Is the conn-max the # of conns allowed to my internal server of from any one external source?&amp;nbsp; Maybe I have this set too high?&lt;/P&gt;&lt;P&gt;Ditto for embryonic-conn-max, per-client-max and per-client-embryonic-max ??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thx&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Jun 2011 16:51:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/suspected-ddos-syn-flood-attack/m-p/1672394#M536856</guid>
      <dc:creator>Phil Williamson</dc:creator>
      <dc:date>2011-06-30T16:51:24Z</dc:date>
    </item>
    <item>
      <title>Suspected DDoS SYN-Flood attack</title>
      <link>https://community.cisco.com/t5/network-security/suspected-ddos-syn-flood-attack/m-p/1672395#M536857</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The conn Max# and per client max# totally depends your infra requirements and how many the server can support (not sure if there any such restriction on server end). But I wouldn't allow any client to open more than 5 max connection and simutaneous conn max# 100-200. In otherwords, always starts from low number and if you there is any connectivity issues you can increase anytime. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hth&lt;/P&gt;&lt;P&gt;MS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Jun 2011 17:19:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/suspected-ddos-syn-flood-attack/m-p/1672395#M536857</guid>
      <dc:creator>mvsheik123</dc:creator>
      <dc:date>2011-06-30T17:19:29Z</dc:date>
    </item>
  </channel>
</rss>

