<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Controlling SYN flooding attack in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/controlling-syn-flooding-attack/m-p/856691#M963303</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I thought the Pix only supported a limited set of IDS signatures and syn attacks wasn't one of them:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX# sh ip audit count&lt;/P&gt;&lt;P&gt;Signature                               Global&lt;/P&gt;&lt;P&gt;1000 I Bad IP Options List              0&lt;/P&gt;&lt;P&gt;1001 I Record Packet Route              0&lt;/P&gt;&lt;P&gt;1002 I Timestamp                        0&lt;/P&gt;&lt;P&gt;1003 I Provide s,c,h,tcc                0&lt;/P&gt;&lt;P&gt;1004 I Loose Source Route               0&lt;/P&gt;&lt;P&gt;1005 I SATNET ID                        0&lt;/P&gt;&lt;P&gt;1006 I Strict Source Route              0&lt;/P&gt;&lt;P&gt;1100 A IP Fragment Attack               0&lt;/P&gt;&lt;P&gt;1102 A Impossible IP Packet             0&lt;/P&gt;&lt;P&gt;1103 A IP Teardrop                      0&lt;/P&gt;&lt;P&gt;2000 I ICMP Echo Reply                  0&lt;/P&gt;&lt;P&gt;2001 I ICMP Unreachable                 0&lt;/P&gt;&lt;P&gt;2002 I ICMP Source Quench               0&lt;/P&gt;&lt;P&gt;2003 I ICMP Redirect                    0&lt;/P&gt;&lt;P&gt;2004 I ICMP Echo Request                0&lt;/P&gt;&lt;P&gt;2005 I ICMP Time Exceed                 0&lt;/P&gt;&lt;P&gt;2006 I ICMP Parameter Problem           0&lt;/P&gt;&lt;P&gt;2007 I ICMP Time Request                0&lt;/P&gt;&lt;P&gt;2008 I ICMP Time Reply                  0&lt;/P&gt;&lt;P&gt;2009 I ICMP Info Request                0&lt;/P&gt;&lt;P&gt;2010 I ICMP Info Reply                  0&lt;/P&gt;&lt;P&gt;2011 I ICMP Address Mask Request        0&lt;/P&gt;&lt;P&gt;2012 I ICMP Address Mask Reply          0&lt;/P&gt;&lt;P&gt;2150 A Fragmented ICMP                  0&lt;/P&gt;&lt;P&gt;2151 A Large ICMP                       0&lt;/P&gt;&lt;P&gt;2154 A Ping of Death                    0&lt;/P&gt;&lt;P&gt;3040 A TCP No Flags                     0&lt;/P&gt;&lt;P&gt;3041 A TCP SYN &amp;amp; FIN Flags Only         0&lt;/P&gt;&lt;P&gt;3042 A TCP FIN Flag Only                0&lt;/P&gt;&lt;P&gt;3153 A FTP Improper Address             0&lt;/P&gt;&lt;P&gt;3154 A FTP Improper Port                0&lt;/P&gt;&lt;P&gt;4050 A Bomb                             0&lt;/P&gt;&lt;P&gt;4051 A Snork                            0&lt;/P&gt;&lt;P&gt;4052 A Chargen                          0&lt;/P&gt;&lt;P&gt;6050 I DNS Host Info                    0&lt;/P&gt;&lt;P&gt;6051 I DNS Zone Xfer                    0&lt;/P&gt;&lt;P&gt;6052 I DNS Zone Xfer High Port          0&lt;/P&gt;&lt;P&gt;6053 I DNS All Records                  0&lt;/P&gt;&lt;P&gt;6100 I RPC Port Registration            0&lt;/P&gt;&lt;P&gt;6101 I RPC Port Unregistration          0&lt;/P&gt;&lt;P&gt;6102 I RPC Dump                         0&lt;/P&gt;&lt;P&gt;6103 A Proxied RPC                      0&lt;/P&gt;&lt;P&gt;6150 I ypserv Portmap Request           0&lt;/P&gt;&lt;P&gt;6151 I ypbind Portmap Request           0&lt;/P&gt;&lt;P&gt;6152 I yppasswdd Portmap Request        0&lt;/P&gt;&lt;P&gt;6153 I ypupdated Portmap Request        0&lt;/P&gt;&lt;P&gt;6154 I ypxfrd Portmap Request           0&lt;/P&gt;&lt;P&gt;6155 I mountd Portmap Request           0&lt;/P&gt;&lt;P&gt;6175 I rexd Portmap Request             0&lt;/P&gt;&lt;P&gt;6180 I rexd Attempt                     0&lt;/P&gt;&lt;P&gt;6190 A statd Buffer Overflow            0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Signature 3050 on the IPS is the signature for SYN attacks, but this is clearly not listed above.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 14 Sep 2007 12:47:28 GMT</pubDate>
    <dc:creator>russ</dc:creator>
    <dc:date>2007-09-14T12:47:28Z</dc:date>
    <item>
      <title>Controlling SYN flooding attack</title>
      <link>https://community.cisco.com/t5/network-security/controlling-syn-flooding-attack/m-p/856689#M963299</link>
      <description>&lt;P&gt;We have a Cisco PIX 515E with pix ver. 6.3(4). We are receiving continuous SYN packets for one specific server. Can we control this attack by PIX 515E appliance. Pl advise how to do this if possible by PIX 515E.&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Raghavan&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 11:11:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/controlling-syn-flooding-attack/m-p/856689#M963299</guid>
      <dc:creator>hraghav</dc:creator>
      <dc:date>2019-03-11T11:11:08Z</dc:date>
    </item>
    <item>
      <title>Re: Controlling SYN flooding attack</title>
      <link>https://community.cisco.com/t5/network-security/controlling-syn-flooding-attack/m-p/856690#M963301</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Well since to my knowledge you cant use the tcp normalization in 6.3 version so you pretty much are left to use the pix?s ids function&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;try this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip audit name PIX-IDS attack action reset&lt;/P&gt;&lt;P&gt;ip audit interface outside PIX-IDS&lt;/P&gt;&lt;P&gt;ip audit attack action reset&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note that you might need to disable som signatures depending on you network you can do that with this command:&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;ip audit signature &lt;SIG_NUMBER&gt; disable&lt;/SIG_NUMBER&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Look up the signatures here:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/products_applied_intelligence_response09186a00808b4d46.html" target="_blank"&gt;http://www.cisco.com/en/US/products/products_applied_intelligence_response09186a00808b4d46.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this help you if you use 7.x version let me know then i can help you with a better config for normalisation of the tcp synflood&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards//Michel&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Sep 2007 07:54:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/controlling-syn-flooding-attack/m-p/856690#M963301</guid>
      <dc:creator>micheljoh</dc:creator>
      <dc:date>2007-09-14T07:54:56Z</dc:date>
    </item>
    <item>
      <title>Re: Controlling SYN flooding attack</title>
      <link>https://community.cisco.com/t5/network-security/controlling-syn-flooding-attack/m-p/856691#M963303</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I thought the Pix only supported a limited set of IDS signatures and syn attacks wasn't one of them:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX# sh ip audit count&lt;/P&gt;&lt;P&gt;Signature                               Global&lt;/P&gt;&lt;P&gt;1000 I Bad IP Options List              0&lt;/P&gt;&lt;P&gt;1001 I Record Packet Route              0&lt;/P&gt;&lt;P&gt;1002 I Timestamp                        0&lt;/P&gt;&lt;P&gt;1003 I Provide s,c,h,tcc                0&lt;/P&gt;&lt;P&gt;1004 I Loose Source Route               0&lt;/P&gt;&lt;P&gt;1005 I SATNET ID                        0&lt;/P&gt;&lt;P&gt;1006 I Strict Source Route              0&lt;/P&gt;&lt;P&gt;1100 A IP Fragment Attack               0&lt;/P&gt;&lt;P&gt;1102 A Impossible IP Packet             0&lt;/P&gt;&lt;P&gt;1103 A IP Teardrop                      0&lt;/P&gt;&lt;P&gt;2000 I ICMP Echo Reply                  0&lt;/P&gt;&lt;P&gt;2001 I ICMP Unreachable                 0&lt;/P&gt;&lt;P&gt;2002 I ICMP Source Quench               0&lt;/P&gt;&lt;P&gt;2003 I ICMP Redirect                    0&lt;/P&gt;&lt;P&gt;2004 I ICMP Echo Request                0&lt;/P&gt;&lt;P&gt;2005 I ICMP Time Exceed                 0&lt;/P&gt;&lt;P&gt;2006 I ICMP Parameter Problem           0&lt;/P&gt;&lt;P&gt;2007 I ICMP Time Request                0&lt;/P&gt;&lt;P&gt;2008 I ICMP Time Reply                  0&lt;/P&gt;&lt;P&gt;2009 I ICMP Info Request                0&lt;/P&gt;&lt;P&gt;2010 I ICMP Info Reply                  0&lt;/P&gt;&lt;P&gt;2011 I ICMP Address Mask Request        0&lt;/P&gt;&lt;P&gt;2012 I ICMP Address Mask Reply          0&lt;/P&gt;&lt;P&gt;2150 A Fragmented ICMP                  0&lt;/P&gt;&lt;P&gt;2151 A Large ICMP                       0&lt;/P&gt;&lt;P&gt;2154 A Ping of Death                    0&lt;/P&gt;&lt;P&gt;3040 A TCP No Flags                     0&lt;/P&gt;&lt;P&gt;3041 A TCP SYN &amp;amp; FIN Flags Only         0&lt;/P&gt;&lt;P&gt;3042 A TCP FIN Flag Only                0&lt;/P&gt;&lt;P&gt;3153 A FTP Improper Address             0&lt;/P&gt;&lt;P&gt;3154 A FTP Improper Port                0&lt;/P&gt;&lt;P&gt;4050 A Bomb                             0&lt;/P&gt;&lt;P&gt;4051 A Snork                            0&lt;/P&gt;&lt;P&gt;4052 A Chargen                          0&lt;/P&gt;&lt;P&gt;6050 I DNS Host Info                    0&lt;/P&gt;&lt;P&gt;6051 I DNS Zone Xfer                    0&lt;/P&gt;&lt;P&gt;6052 I DNS Zone Xfer High Port          0&lt;/P&gt;&lt;P&gt;6053 I DNS All Records                  0&lt;/P&gt;&lt;P&gt;6100 I RPC Port Registration            0&lt;/P&gt;&lt;P&gt;6101 I RPC Port Unregistration          0&lt;/P&gt;&lt;P&gt;6102 I RPC Dump                         0&lt;/P&gt;&lt;P&gt;6103 A Proxied RPC                      0&lt;/P&gt;&lt;P&gt;6150 I ypserv Portmap Request           0&lt;/P&gt;&lt;P&gt;6151 I ypbind Portmap Request           0&lt;/P&gt;&lt;P&gt;6152 I yppasswdd Portmap Request        0&lt;/P&gt;&lt;P&gt;6153 I ypupdated Portmap Request        0&lt;/P&gt;&lt;P&gt;6154 I ypxfrd Portmap Request           0&lt;/P&gt;&lt;P&gt;6155 I mountd Portmap Request           0&lt;/P&gt;&lt;P&gt;6175 I rexd Portmap Request             0&lt;/P&gt;&lt;P&gt;6180 I rexd Attempt                     0&lt;/P&gt;&lt;P&gt;6190 A statd Buffer Overflow            0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Signature 3050 on the IPS is the signature for SYN attacks, but this is clearly not listed above.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Sep 2007 12:47:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/controlling-syn-flooding-attack/m-p/856691#M963303</guid>
      <dc:creator>russ</dc:creator>
      <dc:date>2007-09-14T12:47:28Z</dc:date>
    </item>
    <item>
      <title>Re: Controlling SYN flooding attack</title>
      <link>https://community.cisco.com/t5/network-security/controlling-syn-flooding-attack/m-p/856692#M963305</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What you can do to "conserve" the host being attacked is using the embryonic connection options in the static command. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You probably have a static configured for that host.&lt;/P&gt;&lt;P&gt;Check the static command in the manual:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/security/pix/pix63/command/reference/s.html#wp1026694" target="_blank"&gt;http://www.cisco.com/en/US/docs/security/pix/pix63/command/reference/s.html#wp1026694&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Sep 2007 15:29:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/controlling-syn-flooding-attack/m-p/856692#M963305</guid>
      <dc:creator>nefkensp</dc:creator>
      <dc:date>2007-09-14T15:29:26Z</dc:date>
    </item>
    <item>
      <title>Re: Controlling SYN flooding attack</title>
      <link>https://community.cisco.com/t5/network-security/controlling-syn-flooding-attack/m-p/856693#M963308</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Oupps correct it supports only a limited set of signatures i took it for granted that syn attacs was one of them&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will se if i can find something out for you &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards//Michel&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Sep 2007 16:17:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/controlling-syn-flooding-attack/m-p/856693#M963308</guid>
      <dc:creator>micheljoh</dc:creator>
      <dc:date>2007-09-14T16:17:02Z</dc:date>
    </item>
    <item>
      <title>Re: Controlling SYN flooding attack</title>
      <link>https://community.cisco.com/t5/network-security/controlling-syn-flooding-attack/m-p/856694#M963310</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Didn?t think of that one! &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also you can limit the embryonic connections in the nat command!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Example to limit embryonic sessions to 50:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 1 access-list Nat-List 0 50&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;on the static command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) xxx.xxx.xxx.xxx yyy.yyy.yyy.yyy 0 50&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Sep 2007 16:26:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/controlling-syn-flooding-attack/m-p/856694#M963310</guid>
      <dc:creator>micheljoh</dc:creator>
      <dc:date>2007-09-14T16:26:30Z</dc:date>
    </item>
  </channel>
</rss>

