Hà Nội: NTT03, Line 1, Thống Nhất Complex, 82 Nguyễn Tuân, Thanh Xuân, Hà Nội. ● HCM: Số 31B, Đường 1, Phường An Phú, Quận 2 (Thủ Đức), TP HCM. ===> Đơn Vị Hàng Đầu Trong Lĩnh Vực Cung Cấp Thiết Bị Security - Network - Wifi - CCTV - Conference - Máy chủ Server - Lưu trữ Storge.
Danh mục sản phẩm

Configure Hardware Attack Detection Function

Configuration Conditions

None

Configure Intercepting ICMP Fragment Packet of IPv4&6 Protocol

When the device receives the ICMP fragment packet of the IPv4&6 protocol, drop the packet.

Table 17-12 Configure intercepting the ICMP fragment packet of the IPv4&6 protocol

Step

Command

Description

Enter global configuration mode

configure terminal

-

Configure intercepting the ICMP fragment packet of the IPv4&6 protocol

anti-attack detect frag-icmp

Mandatory

By default, do not configure intercepting the ICMP fragment packet of the IPv4&6 protocol.

Configure Intercepting Super-Large ICMP v4 Packet

When the device receives the super-large ICMPv4 packet, drop the packet.

Table 17-13 Configure intercepting the super-large ICMPv4 packet

Step

Command

Description

Enter global configuration mode

configure terminal

-

Configure intercepting the super-large ICMPv4 packet

anti-attack detect icmpv4-large

Mandatory

By default, do not configure intercepting the super-large ICMPv4 packet, and the attack threshold is 512 bytes.

Configure Intercepting Super-Large ICMP v6 Packet

When the device receives the super-large ICMPv6 packet, drop the packet.

Table 17-14 Configure intercepting the super-large ICMPv6 packet

Step

Command

Description

Enter global configuration mode

configure terminal

-

Configure intercepting the super-large ICMPv6 packet

anti-attack detect icmpv6-large

Mandatory

By default, do not configure intercepting the super-large ICMPv6 packet, and the attack threshold is 512 bytes.

Configure Intercepting IPv4 ping-of- death Packets

When the device receives the IPv4 ping-of- death packet, drop the packet.

Table 17-15 Configure intercepting the IPv4 ping-of- death packet

Step

Command

Description

Enter global configuration mode

configure terminal

-

Configure intercepting the IPv4 ping-of- death packet

anti-attack detect ping-of-death

Mandatory

By default, do not configure intercepting the IPv4 ping-of- death packet attack.

Configure Intercepting smurf Packet

When the device receives the smurf IPv4 packet, drop the packet.

Table 17-16 Configure intercepting the smurf packet

Step

Command

Description

Enter global configuration mode

configure terminal

-

Configure intercepting the smurf attack IPv4 packet

anti-attack detect smurf

Mandatory

By default, do not configure intercepting the smurf attack IPv4 packet.

Configure Intercepting Packet with Same Source and Destination MAC

When the switching port of the device receives the packet with the same source and destination MAC, drop the packet.

Table 17-17 Configure intercepting the packet with the same source and destination MAC

Step

Command

Description

Enter global configuration mode

configure terminal

-

Configure intercepting the packet with the same source and destination MAC

anti-attack detect src-dst-mac-equal

Mandatory

By default, do not configure the function of intercepting the packet with the same source and destination MAC

Configure Intercepting Packet with Same Source and Destination IP

When the switching port of the device receives the packet with the same source and destination IP, drop the packet.

Table 17-18 Configure intercepting the packet with the same source and destination IP

Step

Command

Description

Enter global configuration mode

configure terminal

-

Configure intercepting the packet with the same source and destination IP

anti-attack detect src-dst-ip-equal

Mandatory

By default, do not configure the function of intercepting the packet with the same source and destination IP.

Configure Intercepting TCP/UDP Packet with Same Source and Destination Port

When the switching port of the device receives the TCP/UDP packet with the same source and destination port, drop the packet.

Table 17-19 Configure intercepting the TCP/UDP packet with the same source and destination port

Step

Command

Description

Enter global configuration mode

configure terminal

-

Configure intercepting the

anti-attack detect

Mandatory

TCP/UDP packet with the same source and destination port

src-dst-port-equal

By default, do not configure the function of intercepting the TCP/UDP packet with the same source and destination port.

Configure Intercepting IPv4&v6 Packet with TCP Control Field (flags) and Serial No. (seq) as 0

When the switch port of the device receives the IPv4&6 packet with the TCP control field (flags) and serial number (seq) as 0, drop the packet.

Table 17-20 Configure intercepting the IPv4&v6 packet with the TCP control field (flags) and serial number (seq) as 0

Step

Command

Description

Enter global configuration mode

configure terminal

-

Configure intercepting the IPv4&v6 packet with the TCP control field (flags) and serial number (seq) as 0

anti-attack detect tcp-flag-seq-zero

Mandatory

By default, do not configure intercepting the IPv4&v6 packet with the TCP control field (flags) and serial number (seq) as 0.

Configure Intercepting the Attack of the IPv4&6 Packet with Incomplete TCP Protocol Header Smaller than 20 Bytes

When the switch port of the device receives the attack of the IPv4&6 packet with the incomplete TCP protocol header smaller than 20 bytes, drop the packet.

Table 17-21 Configure intercepting the attack of the IPv4&6 packet with the incomplete TCP protocol header smaller than 20 bytes

Step

Command

Description

Enter global configuration mode

configure terminal

-

Configure intercepting the attack of the IPv4&6 packet with the incomplete TCP protocol header smaller than 20 bytes

anti-attack detect tcp-hdr-incomplete

Mandatory

By default, do not configure intercepting the attack of the IPv4&6 packet with the incomplete   TCP   protocol header   smaller   than   20 bytes.

Configure Intercepting IPv4&6 Attack with TCP FIN, URG, and PSH as 1, but Sequence as 0

When the switch port of the device receives the IPv4&6 attack packet with the TCP FIN, URG, and PSH as 1, but sequence as 0, drop the packet.

Table 17-22 Configure intercepting the IPv4&6 attack packet with the TCP FIN, URG, and PSH as 1, but sequence as 0

Step

Command

Description

Enter global configuration mode

configure terminal

-

Configure intercepting the IPv4&6 attack packet with the TCP FIN, URG, and PSH as 1, but sequence as 0

anti-attack detect tcp-invalid-flag

Mandatory

By default, do not configure intercepting the IPv4&6 attack packet with the TCP FIN, URG, and PSH as 1, but sequence as 0.

Configure Intercepting the IPv4&6 Packet with TCP SYN and FIN Flags Set At the Same Time

When the switch port of the device receives the IPv4&6 packet with SYN FIN flags in TCP set at the same time, drop the packet.

Table 17-23 Configure intercepting the IPv4&6 packet with SYN FIN flags in TCP set at the same time

Step

Command

Description

Enter global configuration mode

configure terminal

-

Configure intercepting the IPv4&6 packet with SYN FIN flags in TCP set at the same time

anti-attack detect tcp-syn-fin

Mandatory

By default, do not configure intercepting the IPv4&6 packet with SYN FIN flags in TCP set at the same time.