11.06.2015 Views

ES4626-SFP Management Guide.pdf

ES4626-SFP Management Guide.pdf

ES4626-SFP Management Guide.pdf

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

the destination port; the "no" form of this command disables this function<br />

Parameter:None<br />

Default:Disable the function by which the switch will check if the source port is equal to<br />

the destination port<br />

Command Mode:Global Mode<br />

Usage <strong>Guide</strong>:With this function enabled, the switch will be able to drop TCP and UDP<br />

data packet whose destination port is equal to the source port. This function can be used<br />

associating the “dosattack-check ipv4-first-fragment enable” function so to block the IPv4<br />

fragment TCP and UDP data packet whose destination port is equal to the source port<br />

Example:Drop the non-fragment TCP and UDP data packet whose destination port is<br />

equal to the source port<br />

Switch(Config)# dosattack-check srcport-equal-dstport enable<br />

2.6.3.5 dosattack-check tcp-fragment enable<br />

Command: [no] dosattack-check tcp-fragment enable<br />

Function:Enable the function by which the switch detects TCP fragment attacks; the “no”<br />

form of this command disables this function<br />

Parameter:None<br />

Default:This function is not enabled on the switch by default<br />

Command Mode: Global Mode<br />

Usage <strong>Guide</strong>:By enabling this function the switch will be protected from the TCP<br />

fragment attacks, dropping the data packets whose TCP fragment offset value is 1 or the<br />

TCP head is shorter than the specified value. Use “dosattack-check tcp-header”<br />

command to specify the length.<br />

Example:Enable the Checking TCP fragment attack function.<br />

Switch(Config)# dosattack-check tcp-fragment enable<br />

2.6.3.6 dosattack-check tcp-header<br />

Command: dosattack-check tcp-header <br />

Function:Configure the minimum TCP head length permitted by the switch<br />

Parameter: is the minimum TCP head length permitted by the switch<br />

Default:The length is 20 by default which is the shortest TCP head<br />

Command Mode:Global Mode<br />

Usage <strong>Guide</strong>:To use this function the “dosattack-check tcp-fragment enable” function<br />

must be enabled<br />

Example: Set the minimum TCP head length permitted by the switch to 20<br />

Switch(Config)# dosattack-check tcp-fragment enable<br />

Switch(Config)# dosattack-check tcp-header 20<br />

110

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!