7.1 DOS

Denial-of-Service (DoS) attack is an attack meant to shut down a machine or network, making it inaccessible to its intended users. DoS attacks accomplish this by flooding the target with traffic, or sending it information that triggers a crash. In both instances, the DoS attack deprives legitimate users (i.e. employees, members, or account holders) of the service or resource they expected.

Victims of DoS attacks often target web servers of high-profile organizations such as banking, commerce, and media companies, or government and trade organizations. Though DoS attacks do not typically result in the theft or loss of significant information or other assets, they can cost the victim a great deal of time and money to handle.

There are two general methods of DoS attacks: flooding services or crashing services. Flood attacks occur when the system receives too much traffic for the server to buffer, causing them to slow down and eventually stop. Popular flood attacks include:

Other DoS attacks simply exploit vulnerabilities that cause the target networks or service to crash. In these attacks, input is sent that takes advantage of bugs in the target that subsequently crash or severely destabilize the network, so that it can’t be accessed or used.

To enable the specific Deniel of Service (DoS) protection, use the command dos in the Global Configuration mode. Otherwise, use the no form of the command to disable the specific DoS protection.

Switch#configure terminal

Switch(config)# dos ipv6-min-frag-size-length 1024

Switch(config)# dos ipv6-min-frag-size-check

Syntax

dos (daeqsa-deny|icmp-frag-pkts-deny|icmpv4-ping-max- check|icmpv6-ping-max-check|ipv6-min-frag-size-check|land- deny|nullscan-deny|pod-deny|smurf-deny|syn-sportl1024-

deny|synfin-deny|synrst-deny|tcp-frag-off-min-check|tcpblat- deny|tcphdr-min-check|udpblat-deny|xmas-deny)

dos icmp-ping-max-length MAX_LEN

dos ipv6-min-frag-size-length MIN_LEN

dos smurf-netmask MASK

dos tcphdr-min-length HDR_MIN_LEN

no dos (tcp-frag-off-min-check|synrst-deny|synfin-deny|xma- deny|nullscan-deny|syn-sportl1024-deny|tcphdr-min-check|smurf- deny|icmpv6-ping-max-check|icmpv4-ping-max-check|icmp-frag- pkts-deny|ipv6-min-frag-size-check|pod-deny|tcpblat- deny|udpblat-deny|land-deny|daeqsa-deny)

Parameter

daeqsa-deny Drops the packets if the destination MAC address is equal to the source MAC address.

icmp-frag-pkts-deny Drops the fragmented ICMP packets.

icmpv4-ping-max- check Checks the maximum size of ICMP ping packets, and drops the packets larger than the maximum packet size defined by the command dos icmp-ping-max-length MAX_LEN

icmpv6-ping-max- check Checks the maximum size of ICMPv6 ping packets, and drops the packets larger than the maximum packet size defined by the command dos icmp-ping-max- length MAX_LEN.

ipv6-min-frag- size-check Checks the minimum size of IPv6 fragments, and drops the packets smaller than the minimum size defined by the command dos ipv6-min-frag-size-length MIN_LEN.

land-deny Drops the packets if the source IP address is equal to the destination IP address.

nullscan-deny Drops the packets with NULL scan.

pod-deny Avoids ping of death attack.

smurf-deny Avoids smurf attack.

syn-sportl1024-deny Drops SYN packets with sport less than 1024.

synfin-deny Drops the packets with SYN and FIN bits set.

synrst-deny Drops the packets with SYN and RST bits set.

tcp-frag-off-min- check Drops the TCP fragment packets with offset equals to one.

tcpblat-deny Drops the packages if the TCP source port is equal to the TCP destination port.

tcphdr-min-check Checks the minimum TCP header and drops the TCP packets with the header smaller than the minimum size defined by the command dos tcphdr-min-length HDR_MIN_LEN.

udpblat-deny Drops the packets if the UDP source port equals to the UDP destination port.

xmas-deny Drops the packets if the sequence number is zero, and the FIN, URG and PSH bits are set.

icmp-ping-max- length MAX_LEN Specify the maximum size of the ICMPv4/ICMPv6 ping packets. The valid range is from 0 to 65535 bytes, and the default value is 512 bytes.

ipv6-min-frag- size-length MIN_LEN Specify the minimum size of IPv6 fragments. The valid range is from 0 to 65535 bytes, and default value is 1240 bytes.

smurf-netmask MASK Specify the netmask of smurf attack. The length range is from 0 to 323 bytes, and default length is 0 bytes.

tcphdr-min-length HDR_MIN_LEN Specify the minimum TCP header length. The length range is from 0 to 31 bytes, and default length is 20 bytes.

Default

All of DoS protections are enabled by default. The default parameter are:

- The maximum size of ICMP ping packages is 512 bytes

- The minimum size of IPv6 fragments is 1240 bytes.

- The Smurf netmask length is 0 bytes.

- The minimum TCP header length is 20 bytes

Mode

Global Configuration

Example

The following example sets the minimum fragment size to 1024 bytes, and enables the minimum size of IPv6 fragments validation.

Switch#configure terminal

Switch(config)# dos ipv6-min-frag-size-length 1024

Switch(config)# dos ipv6-min-frag-size-check

 

7.2 DOS (INTERFACE)

To enable the DoS on the specific interface, use the command dos in the Interface Configuration mode. Otherwise, use the “no” form of the command to disable the DoS on the interface.

Switch#configure terminal

Switch(config)# interface {interface-ID}

Switch(config-if)# dos

Switch(config-if)# no dos

Syntax

dos

no dos

Default

DoS protection is disabled on each interface.

Mode

Interface Configuration

Example

The following example enables the DoS on the interface GigabitEthernet 2.

Switch#configure terminal

Switch(config)# interface GigabitEthernet 2

Switch(config-if)# dos

 

7.3 SHOW DOS

To show the DoS protection configuration, use the command show dos in the Privileged EXEC mode. For the status of DoS protection on each interface, use the command show dos interface in the Privileged EXEC mode.

Switch# show dos

Switch# show dos interface {IF_PORTS}

Syntax

show dos

show dos interface {IF_PORTS}

Parameter

interface{IF_PORTS} An interface ID or the list of interface IDs

Mode

Privileged EXEC

Example

The following example shows the global DoS protection configuration.

Switch# show dos