Configuring A Scanning Attack Defense Policy - HPE FlexNetwork 7500 Series Security Configuration Manual

Table of Contents

Advertisement

Step
4.
(Optional.) Set the
maximum length of safe
ICMP or ICMPv6 packets.
5.
(Optional.) Specify the
actions against
single-packet attacks of a
specific level.
6.
(Optional.) Enable
signature detection for
single-packet attacks of a
specific level.

Configuring a scanning attack defense policy

Apply a scanning attack defense policy to the interface that is connected to the external network.
Scanning attack detection inspects the incoming packet rate of connections to the target system. If a
source initiates connections at a rate equal to or exceeding the pre-defined threshold, the device can
take the following actions:
Output logs.
Drop subsequent packets from the IP address of the attacker.
Add the attacker's IP address to the IP blacklist.
To blacklist the attackers, you must enable the blacklist feature globally or on the interface where the
defense policy is applied. For more information about the blacklist, see
feature."
To configure a scanning attack defense policy:
Step
1.
Enter system view.
2.
Enter attack defense policy
view.
3.
Configure scanning attack
detection.
Command
signature detect ipv6-ext-header
ext-header-value [ action { { drop |
logging } * | none } ]
signature { large-icmp |
large-icmpv6 } max-length length
signature level { high | info | low |
medium } action { { drop | logging } * |
none }
signature level { high | info | low |
medium } detect
Command
system-view
attack-defense policy
policy-name
scan detect level { high | low |
medium } action
{ { block-source [ timeout
minutes ] | drop } | logging } *
384
Remarks
By default, the maximum
length of safe ICMP or ICMPv6
packets is 4000 bytes.
A large ICMP or ICMPv6
attack occurs if an ICMP or
ICMPv6 packet larger than the
specified length is detected.
The default action is logging
for single-packet attacks of the
informational and low levels.
The default actions are
logging and drop for
single-packet attacks of the
medium and high levels.
By default, signature detection
is disabled for all levels of
single-packet attacks.
"Configuring the IP blacklist
Remarks
N/A
N/A
By default, scanning attack
detection is not configured.

Advertisement

Table of Contents
loading

Table of Contents