cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
897
Views
0
Helpful
3
Replies

Cisco ACE DoS

belaldarwish
Level 1
Level 1

We have a security scanning tool  that has overloaded the ACE during it's scans due to the high number of connections it creates towards the servers.

I would like to configure the ACE so that it can protect itself from DoS attacks, specificailly I want the ACE to be able to limit the rate of incomming connections.

I came accross the feature "Configuring Rate Limits for a Policy Map", in here: http://www.cisco.com/en/US/docs/app_ntwk_services/data_center_app_services/ace_appliances/vA3_1_0/configuration/security/guide/tcpipnrm.html#wp1125308

But I am not sure how the policy map is applied. Is the configured limit-rate applied per server farm/VIP? or per interface? Should I configure the rate-limit class-map under the load balance policy, or under a seperate policy?

I found the below statement in here: http://www.cisco.com/en/US/docs/app_ntwk_services/data_center_app_services/ace_appliances/vA3_x/command/reference/parammap.html#wp1195366

"

The ACE applies these rate limits to each class map that you associate with the policy at the virtual server level."

What does the above statement mean?

3 Replies 3

Jorge Bejarano
Level 4
Level 4
Hi, 

Try the following:

host1/Admin(config)# parameter-map type connection RATE-LIMIT-TAC
host1/Admin(config-parammap-conn)# rate-limit connection 100000

policy-map multi-match client-vips  
class slb-vip    
loadbalance vip inservice
loadbalance policy slb
nat dynamic 5 vlan 50
connection advanced-options RATE-LIMIT-TAC >>>> apply it here!

Jorge

Mark it if was useful


Thank you.

According to the document, the parameter map is applied to a Virtual Server through the command

connection advanced-options

But what I actually want to achive is to make the box protect itself, and not the servers/virtual servers. This is because the security scanning tool overloads the ACE itself, making it unavailable, and causing and outage for all server farms.

What I am looking for is a global command that applies to the ACE, that will limit the overall connections comming into the server, without specifiying a virtual server/real server.

Hi,

You can also try this:

To limit the maximum number of ACE connections, create a resource class and then use the following commands:

Through-the-ACE connections—limit-resource conc-connections

To-the-ACE connectionslimit-resource mgmt-connections

Make sure that you assign the current context to the resource class.

For details on security features on ACE i would also suggest to go through the below link:

http://www.cisco.com/en/US/docs/interfaces_modules/services_modules/ace/vA5_1_0/configuration/security/guide/tcpipnrm.html#wp1010556

Let me know if that helps.

Regards,

Kanwal

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: