Tcp security enhancement – Brocade TurboIron 24X Series Configuration Guide User Manual

Page 1060

Advertising
background image

1026

Brocade TurboIron 24X Series Configuration Guide

53-1003053-01

Protecting against TCP SYN attacks

The device supports the following burst-normal, burst-max, and lockup values.

The number of incoming TCP SYN packets per second are measured and compared to the
threshold values as follows:

If the number of TCP SYN packets exceeds the burst-normal value, the excess TCP SYN packets
are dropped.

If the number of TCP SYN packets exceeds the burst-max value, all TCP SYN packets are
dropped for the number of seconds specified by the lockup value. When the lockup period
expires, the packet counter is reset and measurement is restarted.

In the example above, if the number of TCP SYN packets received per second exceeds 30, the
excess packets are dropped. If the number of TCP SYN packets received per second exceeds 100,
the device drops all TCP SYN packets for the next 300 seconds (five minutes).

Configuration notes

Consider the following statements when DoS attack protection is implemented at port level or
Virtual Interface (VE) level.

The ACL based ingress rate-limiting for TCP flow on a port is not accurate if TCP Dos attack
protection is enabled on the same port. Non-TCP flows are not affected.

TCP DoS attack protection considers packet marked as drop by port-based ingress rate
limiting. In this case, even if the port-based ingress rate-limiting reduces the packet per byte
rate, DoS attack is still detected by using actual ingress packet per byte rate on a port.

TCP security enhancement

TCP security enhancement improves upon the handling of TCP inbound segments. This
enhancement eliminates or minimizes the possibility of a TCP reset attack, in which a perpetrator
attempts to prematurely terminate an active TCP session, and a data injection attack, wherein an
attacker injects or manipulates data in a TCP connection.

In both cases, the attack is blind, meaning the perpetrator does not have visibility into the content
of the data stream between two devices, but blindly injects traffic. Also, the attacker does not see
the direct effect, the continuing communications between the devices and the impact of the
injected packet, but may see the indirect impact of a terminated or corrupted session.

The TCP security enhancement prevents and protects against the following three types of attacks:

Blind TCP reset attack using the reset (RST) bit.

Blind TCP reset attack using the synchronization (SYN) bit

Blind TCP packet injection attack

The TCP security enhancement is automatically enabled.

Protecting against a blind TCP reset attack using the RST bit

In a blind TCP reset attack using the RST bit, a perpetrator attempts to guess the RST segments in
order to prematurely terminate an active TCP session.

To prevent a user from using the RST bit to reset a TCP connection, the RST bit is subject to the
following rules when receiving TCP segments:

Advertising