Prevent Icmp Fragment Attack Function Configuration Task Sequence; Security Feature Example - Planet WGSW-52040 Configuration Manual

48-port 10/100/1000base-t + 4-port 100/1000x sfp managed switch
Hide thumbs Also See for WGSW-52040:
Table of Contents

Advertisement

45.2.5 Prevent ICMP Fragment Attack Function
Configuration Task Sequence
1. Enable the prevent ICMP fragment attack function
2. Configure the max permitted ICMPv4 net load length
Command
Global Mode
[no] dosattack-check icmp-attacking
enable
dosattack-check icmpv4-size <size>

45.3 Security Feature Example

Scenario:
The User has follows configuration requirements: the switch do not forward data packet whose
source IP address is equal to the destination address, and those whose source port is equal to
the destination port. Only the ping command with defaulted options is allowed within the IPv4
network, namely the ICMP request packet can not be fragmented and its net length is normally
smaller than 100.
Configuration procedure:
Switch(config)# dosattack-check srcip-equal-dstip enable
Switch(config)# dosattack-check srcport-equal-dstport enable
Switch(config)# dosattack-check icmp-attacking enable
Switch(config)# dosattack-check icmpV4-size 100
Explanation
Enable/disable the prevent ICMP fragment
attack function.
Configure the max permitted ICMPv4 net load
length. This command has not effect when
used separately, the user have to enable the
dosattack-check icmp-attacking enable.
45-170

Advertisement

Table of Contents

Troubleshooting

loading

Table of Contents