Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

header-navigation
keyboard_arrow_up
close
keyboard_arrow_left
Common Criteria Guide for vSRX3.0
Table of Contents Expand all
list Table of Contents
file_download PDF
{ "lLangCode": "en", "lName": "English", "lCountryCode": "us", "transcode": "en_US" }
English
keyboard_arrow_right

Configuring IP Sweep Attack Screen

date_range 29-Sep-23

This topic describes how to configure detection of an IP sweep attack.

An address sweep occurs when one source IP address sends a defined number of ICMP packets to different hosts within a defined time interval (5000 microseconds is the default value). The purpose of this attack is to send ICMP packets—typically echo requests—to various hosts in the hope that at least one replies, thus uncovering an address to target.

To enable detection of an IP sweep attack:

  1. Configure interfaces and assign an IP address to interfaces.
    content_copy zoom_out_map
    [edit]
    user@host# set interfaces ge-0/0/1 unit 0 family inet address 192.0.2.0/24
    user@host# set interfaces ge-0/0/3 unit 0 family inet address 198.51.100.0/24
    
  2. Configure security zones trustZone and untrustZone and assign interfaces to them.
    content_copy zoom_out_map
    [edit]
    user@host# set security zones security-zone trustZone host-inbound-traffic system-services all
    user@host# set security zones security-zone trustZone host-inbound-traffic protocols all
    user@host# set security zones security-zone trustZone interfaces ge-0/0/1.0
    user@host# set security zones security-zone untrustZone host-inbound-traffic system-services all
    user@host# set security zones security-zone untrustZone host-inbound-traffic protocols all
    user@host# set security zones security-zone untrustZone interfaces ge-0/0/3.0
    
  3. Configure security policies from untrustZone to trustZone.
    content_copy zoom_out_map
    [edit]
    user@host# set security policies from-zone untrustZone to-zone trustZone policy policy1 match source-address any
    user@host# set security policies from-zone untrustZone to-zone trustZone policy policy1 match destination-address any
    user@host# set security policies from-zone untrustZone to-zone trustZone policy policy1 match application any
    user@host# set security policies from-zone untrustZone to-zone trustZone policy policy1 then permit
    user@host# set security policies default-policy deny-all
    
  4. Configure security screens and attach them to untrustZone.
    content_copy zoom_out_map
    [edit]
    user@host# set security screen ids-option untrustScreen icmp ip-sweep
    user@host# set security screen ids-option untrustScreen alarm-without-drop
    user@host# set security zones security-zone untrustZone screen untrustScreen
    
  5. Configure syslog.
    content_copy zoom_out_map
    [edit]
    user@host# set system syslog file syslog any any
    user@host# set system syslog file syslog archive size 10000000
    user@host# set system syslog file syslog explicit-priority
    user@host# set system syslog file syslog structured-data
    user@host# set security policies from-zone untrustZone to-zone trustZone policy policy1 then log session-init
    user@host# set security policies from-zone untrustZone to-zone trustZone policy policy1 then log session-close
    
  6. Commit the configuration.
    content_copy zoom_out_map
    [edit]
    user@host# commit
    
footer-navigation