Administrator Guide

Security Commands 1033
Denial of Service Commands
Dell Networking N1500/N2000/N3000/N4000 Series Switches
The Dell Networking DoS capability supports a package of filters intended to
provide network administrators the ability to reduce network exposure to
common attack vectors. The following list shows the DoS attack detection
Dell Networking supports.
•SIP=DIP:
Source IP address = Destination IP address.
•First Fragment:
TCP Header size smaller then configured value.
•TCP Fragment:
–IP Fragment Offset = 1.
TCP Flag:
TCP Flag SYN set and Source Port < 1024 or TCP Control Flags = 0
and
TCP Sequence Number = 0 or TCP Flags FIN, URG, and PSH set
and
TCP Sequence Number = 0 or TCP Flags SYN and FIN set.
•L4 Port:
Source TCP/UDP Port = Destination TCP/UDP Port.
•ICMP:
Limiting the size of ICMP Ping packets.
•SMAC=DMAC:
Source MAC address = Destination MAC address.
•TCP Port:
Source TCP Port = Destination TCP Port.
•UDP Port:
Source UDP Port = Destination UDP Port.
TCP Flag & Sequence:
2CSNXXX_SWUM204.book Page 1033 Monday, January 25, 2016 1:25 PM