11-27-2002 12:19 AM - edited 03-09-2019 01:13 AM
Is it possible to block traffic for a certain time (e.g. 5 minutes) for an address range (all users in 192.16.18.0) after a TCP SYN flooding attack has occured?
To prevent the SYN flooding we use the ip tcp intercept command, but with that, there is no option to block traffic.
Is there a solution without installing the IOS Firewall feature set on these routers?
11-27-2002 02:41 AM
the software drops the oldest partial connection. Alternatively, you can configure the software to drop a random connection. To set the drop mode, use the following command in global configuration mode:
ip tcp intercept drop-mode
{oldest | random}
or you can make an access list to deny all users on 192.16.18.0 and apply it to the interface for a shot time then disabling it
11-27-2002 08:08 AM
Or you could install IDS which does exactly what you're asking.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide