Configuring Network Attack Protection With IDS Screens for Next Gen Services
Configuring the IDS Screen Name, Direction, and Alarm Option
Configure the IDS screen name, traffic direction, and optional alarm.
Configuring Session Limits in the IDS Screen
You can use IDS screens to set session limits for traffic from individual addresses or subnets and to individual addresses or subnets. This protects against network probing and flooding attacks. Table 1 shows the session limit options that protect against some common network probing and flooding attacks.
Network Attack Type |
|
---|---|
ICMP Address Sweep |
by-source by-protocol icmp { maximum-sessions number; packet-rate number; session-rate number; } |
ICMP Flood |
by-destination by-protocol icmp { maximum-sessions number; packet-rate number; session-rate number; } |
TCP Port Scan |
(by-destination | by-source) by-protocol tcp { maximum-sessions number; packet-rate number; } |
TCP SYN Flood |
(by-destination | by-source) by-protocol tcp { maximum-sessions number; packet-rate number; session-rate number; } |
UDP Flood |
by-destination by-protocol udp { maximum-sessions number; packet-rate number; session-rate number; } |
To configure the session limits in an IDS screen:
Configuring Suspicious Packet Pattern Detection in the IDS Screen
You can use IDS screens to identify and drop suspicious packets. This protects against attackers that craft unusual packets to launch denial-of-service attacks.
To configure suspicious pattern detection:
Configuring the Service Set for IDS
Configure a service set to apply the IDS screen.