[
Contents]
[
Prev]
[
Next]
[
Index]
[
Report an Error]
Attack Context
An attack context defines the location of the signature. If
you know the service and the specific service context, specify that
service and then specify the appropriate service contexts. If you
know the service, but are unsure of the specific service context,
specify one of the following general contexts:
-
first-data-packet—Specify this context
to detect the attack in only the first data packet.
-
first-packet—Specify this context to detect
the attack in only the first packet of a stream. When the flow direction
for the attack object is set to any, the device checks the
first packet of both the server-to-client and the client-to-server
flows. If you know that the attack signature appears in the first
packet of a session, choosing first packet instead of packet reduces the amount of traffic the device needs to monitor,
which improves performance.
-
packet—Specify this context to match the
attack pattern within a packet. When you select this option, you must
also specify the service binding to define the service header options
. Although not required, specifying these additional parameters improves
the accuracy of the attack object and thereby improves performance.
-
line—Specify this context to detect a pattern
match within a specific line within your network traffic.
-
normalized-stream—Specify this context
to detect the attack in an entire normalized stream. The normalized
stream is one of the multiple ways of sending information. In this
stream the information in the packet is normalized before a match
is performed. Suppose www.yahoo.com/sports is the same as www.yahoo.com/s%70orts. The normalized form to represent both
of these URLs might be www.yahoo.com/sports. Choose normalized
stream instead of stream, unless you want to detect
some pattern in its exact form. For example, if you want to detect
the exact pattern www.yahoo.com/s%70orts, then select stream.
-
normalized-stream256—Specify this context
to detect the attack in only the first 256 bytes of a normalized stream.
-
normalized-stream1k—Specify this context
to detect the attack in only the first 1024 bytes of a normalized
stream.
-
normalized-stream-8k—Specify this context
to detect the attack in only the first 8192 bytes of a normalized
stream.
-
stream—Specify this context to reassemble
packets and extract the data to search for a pattern match. However,
the device cannot recognize packet boundaries for stream contexts,
so data for multiple packets is combined. Specify this option only
when no other context option contains the attack.
-
stream256—Specify this context to reassemble
packets and search for a pattern match within the first 256 bytes
of a traffic stream. When the flow direction is set to any, the device checks the first 256 bytes of both the server-to-client
and client-to-server flows. If you know that the attack signature
will appear in the first 256 bytes of a session, choosing stream256 instead of stream reduces the amount of traffic that the
device must monitor and cache, thereby improving performance.
-
stream1k—Specify this context to reassemble
packets and search for a pattern match within the first 1024 bytes
of a traffic stream. When the flow direction is set to any, the device checks the first 1024 bytes of both the server-to-client
and client-to-server flows. If you know that the attack signature
will appear in the first 1024 bytes of a session, choosing stream1024 instead of stream reduces the amount of traffic that the
device must monitor and cache, thereby improving performance.
-
stream8k—Specify this context to reassemble
packets and search for a pattern match within the first 8192 bytes
of a traffic stream. When the flow direction is set to any, the device checks the first 8192 bytes of both the server-to-client
and client-to-server flows. If you know that the attack signature
will appear in the first 8192 bytes of a session, choosing stream8192 instead of stream reduces the amount of traffic that the
device must monitor and cache, thereby improving performance.
[
Contents]
[
Prev]
[
Next]
[
Index]
[
Report an Error]