
3 Configuration commands Intrusion detection system commands
NN47928-107 43
ids flood activity
Flood attacks result in denial of service. IDS can detect floods targeted at
protocols and services. IDS refers to a threshold value to detect a flood
attack. The threshold varies depending on the protocol or service being
protected. Use this command to configure IDS flood detection.
Syntax config ids flood activity [udpflood|icmpflood|arpflood|
synflood|espflood|unknowipprotoflood|stpflood|cdpflood|
unknowntypeflood] active [no|yes]
Parameters attack udpflood|icmpflood|arpflood|
synflood|espflood|unknowipprotoflood|stpflood|cdpflood|
unknowntypeflood
Specify the flood activity to detect.
udpflood — In a UDP flood, UDP packets are
sent to inactive services (ports); the receiver
then replies with an ICMP Destination
Unreachable packet. The flood results in
Denial-of-Service, due to sending out several
ICMP packets.
icmpflood — An ICMP flood sends over-sized
or an excessive number of ICMP packets. This
can crash the TCP/IP stack, causing the unit to
stop responding to TCP/IP requests.
arpflood — In an ARP flood, 250 ARP request
per second are accepted. Over this limit
indicates a potential DoS attack.
synflood — SYN (synchronization) packets are
repeatedly sent to every port on the server,
using fake IP addresses. SYN flooding can
result in denial of service.
espflood — Encapsulated Security Payload
(ESP) flood. An ESP flood sends bad IPsec
traffic. Packets are discarded after the
threshold rate limit is reached.
unknowipprotoflood — This flood activity
type refers to floods for IP protocols other than
those listed specifically.
stpflood — Spanning Tree Protocol (STP)
flood. An STP flood sends bad STP packets.
Packets are discarded after the threshold rate
limit is reached.
cdpflood — Cisco Discovery Protocol (CDP)
flood. A CDP flood sends CDP packets at a high
rate. Packets are discarded after a threshold
rate limit is reached.
Comentarios a estos manuales