Got it

Anti IP/ICMP attack – configuration procedure

Latest reply: Sep 13, 2021 15:01:24 787 52 25 0 0

Hello, everyone!


Today, I will shortly explain IP and ICMP attacks and how we can protect our system.


ICMP (Internet Control Message Protocol) is a very popular and useful protocol. The most famous are ping and traceroute. Hackers use the weakness of the ICMP protocol. This protocol is one-way communication. It is used by hackers and they trigger attacks. Mainly, these are ping flood, ICMP_ECHO flood, and smurf attacks. Systems exposed to this type of attack work slowly and have problems connecting to the Internet.


i

Fig. 1 – ICMP attack

(https://www.allot.com/blog/the-ddos-education-series-part-34-an-eye-opening-look-at-blind-and-targeted-ping-flood-attacks/)



Hackers send a large number of packets to the main system device in a short period of time. Their destination address is the IP address of the system. The main system device is overloaded and cannot serve valid users. Anti-IP/ICMP protection allows the discard of packets sent to the main system device – e.g. OLT.


Next command can show us all security configuration on OLT:


TEST#display security config

{ <cr>||<K> }:

Command:

display security config

Anti-ipspoofing function                          : disable

Anti-dos function                                 : enable

Anti-macspoofing function                         : enable

Anti-ipattack function                            : disable

Anti-icmpattack function                          : disable

Source-route filter function                      : disable

Anti-macduplicate function                        : enable

PPPoE overall aging time(sec)                     : 360

PPPoE aging period(sec)                           : 90

ARP detect mode                                   : dummy

Anti-dos control-packet policy                    : deny

Packet unaffected by anti-ipspoofing              : IGMP

Packet unaffected by anti-ipv6spoofing            : --

NS-reply function                                 : disable

NS-reply unknown-policy                           : forward

ARP-reply function                                : disable

ARP-reply unknown-policy                          : forward

Anti-ipv6spoofing function                        : disable

IPv6 DAD proxy function                           : disable

IPv6 bind route and ND                            : disable

Packet unaffected by anti-macspoofing             : IGMP

DHCP client identifier                            : chaddr

Packet ignored by anti-macspoofing                : --

Anti-illegal-arp function                         : enable

Anti-illegal-nd function                          : enable

User delete delay(sec)                            : 0

Anti-macduplicate alarm function           : disable

Anti-ipv6attack function                          : disable

Anti-icmpv6attack function                     : disable

Anti-ipconflict refresh function               : disable

Anti-illegal-hoplimit-nd function            : disable

IP option packet-policy                          : to-cpu

DHCP packet anti-dos control-packet period(sec)   : 1


Commands for activate anti-ICMP/IP attacks are:


TEST(config)#security anti-ipattack

{ control-packet<K>|disable<K>|enable<K> }:enable

Command:

security anti-ipattack enable


TEST(config)#security anti-icmpattack

{ control-packet<K>|disable<K>|enable<K> }:enable

Command:

security anti-icmpattack enable


After these commands, we can see:


TEST#display security config

{ <cr>||<K> }:

Command:

display security config

Anti-ipspoofing function                          : disable

Anti-dos function                                 : enable

Anti-macspoofing function                         : enable

Anti-ipattack function                            : enable

Anti-icmpattack function                          : enable

Source-route filter function                      : disable

Anti-macduplicate function                        : enable

.



Thank you!


Reference:

  • https://www.allot.com/blog/the-ddos-education-series-part-34-an-eye-opening-look-at-blind-and-targeted-ping-flood-attacks/

  • https://help.eset.com/glossary/sr-Latn-RS/icmp_attacks.html


The post is synchronized to: Author groupVlada85's Author Collection

Thanks for sharing friend
View more
  • x
  • convention:

EL.BODO
EL.BODO Created Jun 11, 2021 16:18:48 (0) (0)
 
Interesting, my friend
View more
  • x
  • convention:

Vlada85
Vlada85 Created Jun 9, 2021 17:09:06 (0) (0)
Thank you!  
Well done! My friend!
View more
  • x
  • convention:

Vlada85
Vlada85 Created Jun 9, 2021 17:08:55 (0) (0)
Thank you!  
Thanks for sharing.
View more
  • x
  • convention:

EL.BODO
EL.BODO Created Jun 11, 2021 16:21:08 (0) (0)
 
Anti IP/ICMP attack – configuration procedure-3966157-1
View more
  • x
  • convention:

zaheernew
MVE Author Created Jun 11, 2021 06:29:47

Anti IP/ICMP attack – configuration procedure-3966175-1
View more
  • x
  • convention:

Good
View more
  • x
  • convention:

well done
View more
  • x
  • convention:

AliBinHussain
AliBinHussain Created Jun 12, 2021 17:06:18 (0) (0)
 
AliBinHussain
AliBinHussain Created Jun 12, 2021 17:06:24 (0) (0)
 
kunthea
kunthea Created Jun 13, 2021 14:22:09 (0) (0)
 
nice
View more
  • x
  • convention:

kunthea
kunthea Created Jun 13, 2021 14:22:16 (0) (0)
 

Comment

You need to log in to comment to the post Login | Register
Comment

Notice: To protect the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but are not limited to the following:
  • Politically sensitive content
  • Content concerning pornography, gambling, and drug abuse
  • Content that may disclose or infringe upon others ' commercial secrets, intellectual properties, including trade marks, copyrights, and patents, and personal privacy
Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see " User Agreement."

My Followers

Login and enjoy all the member benefits

Login

Block
Are you sure to block this user?
Users on your blacklist cannot comment on your post,cannot mention you, cannot send you private messages.
Reminder
Please bind your phone number to obtain invitation bonus.