Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

Announcement: Try the Ask AI chatbot for answers to your technical questions about Juniper products and solutions.

close
header-navigation
keyboard_arrow_up
close
keyboard_arrow_left
list Table of Contents
file_download PDF
{ "lLangCode": "en", "lName": "English", "lCountryCode": "us", "transcode": "en_US" }
English
keyboard_arrow_right

Configuring TCP SYN and RST Attack Screen

date_range 18-Aug-21

This topic describes how to configure TCP packet when the SYN and RST flags are set.

To enable detection of a TCP SYN and RST attack:

  1. Configure interfaces and assign an IP address to interfaces.
    content_copy zoom_out_map
    [edit]
    user@host# set interfaces ge-0/0/1 unit 0 family inet address 192.0.2.0/24
    user@host# set interfaces ge-0/0/3 unit 0 family inet address 198.51.100.0/24
    
  2. Configure security zones trustZone the untrustZone and assign interfaces to them.
    content_copy zoom_out_map
    [edit]
    user@host# set security zones security-zone trustZone host-inbound-traffic system-services all
    user@host# set security zones security-zone trustZone host-inbound-traffic protocols all
    user@host# set security zones security-zone trustZone interfaces ge-0/0/1.0
    user@host# set security zones security-zone untrustZone host-inbound-traffic system-services all
    user@host# set security zones security-zone untrustZone host-inbound-traffic protocols all
    user@host# set security zones security-zone untrustZone interfaces ge-0/0/3.0
    
  3. Configure the IDP custom-attack signatures.
    content_copy zoom_out_map
    [edit]
    user@host# set security idp idp-policy idpengine rulebase-ips rule 1 match from-zone any
    user@host# set security idp idp-policy idpengine rulebase-ips rule 1 match source-address any
    user@host# set security idp idp-policy idpengine rulebase-ips rule 1 match to-zone any
    user@host# set security idp idp-policy idpengine rulebase-ips rule 1 match destination-address any
    user@host# set security idp idp-policy idpengine rulebase-ips rule 1 match application default
    user@host# set security idp idp-policy idpengine rulebase-ips rule 1 match attacks custom-attacks syn_rst
    user@host# set security idp idp-policy idpengine rulebase-ips rule 1 then action no-action
    user@host# set security idp idp-policy idpengine rulebase-ips rule 1 then notification log-attacks
    user@host# set security idp active-policy idpengine
    user@host# set security idp custom-attack syn_rst severity info
    user@host# set security idp custom-attack syn_rst attack-type signature context packet
    user@host# set security idp custom-attack syn_rst attack-type signature pattern 
    user@host# set security idp custom-attack syn_rst attack-type signature direction any
    user@host# set security idp custom-attack syn_rst attack-type signature protocol tcp tcp-flags rst
    user@host# set security idp custom-attack syn_rst attack-type signature protocol tcp tcp-flags syn
    
  4. Configure security policies from untrustZone to trustZone.
    content_copy zoom_out_map
    [edit]
    user@host# set security policies from-zone untrustZone to-zone trustZone policy policy1 match source-address any
    user@host# set security policies from-zone untrustZone to-zone trustZone policy policy1 match destination-address any
    user@host# set security policies from-zone untrustZone to-zone trustZone policy policy1 match application any
    user@host# set security policies from-zone untrustZone to-zone trustZone policy policy1 then permit application-services idp
    user@host# set security policies default-policy deny-all
    
  5. Configure security tcp-session option in flow.
    content_copy zoom_out_map
    [edit]
    user@host# set security flow tcp-session no-syn-check
    user@host# set security flow tcp-session no-sequence-check
    
  6. Configure syslog.
    content_copy zoom_out_map
    [edit]
    user@host# set system syslog file syslog any any
    user@host# set system syslog file syslog archive size 10000000
    user@host# set system syslog file syslog structured-data
    user@host# set security policies from-zone untrustZone to-zone trustZone policy policy1 then log session-init
    user@host# set security policies from-zone untrustZone to-zone trustZone policy policy1 then log session-close
    
  7. To allow the traffic to reach the destination, configure the tcp-session option.
    content_copy zoom_out_map
    [edit]
    user@host# set security flow tcp-session relax-check
    
  8. Commit the configuration.
    content_copy zoom_out_map
    [edit]
    user@host# commit
    
footer-navigation