Configuring Attack Detection And Prevention; Overview; Configuring Tcp Fragment Attack Prevention - HP 5920 Series Configuration Manual

Hide thumbs Also See for 5920 Series:
Table of Contents

Configuring attack detection and prevention

Overview

Attack detection and prevention enables a device to detect attacks by inspecting arriving packets, and
to take prevention actions, such as packet dropping, to protect a private network.
The device supports only TCP fragment attack prevention.

Configuring TCP fragment attack prevention

The TCP fragment attack prevention feature enables the device to drop attack TCP fragments to prevent
TCP fragment attacks that traditional packet filter cannot detect. As defined in RFC 1858, attack TCP
fragments refer to the following TCP fragments:
First fragments in which the TCP header is smaller than 20 bytes.
Non-first fragments with a fragment offset of 8 bytes (FO=1).
To configure TCP fragment attack prevention:
Step
1.
Enter system view.
2.
Enable TCP fragment attack
prevention.
Command
system-view
attack-defense tcp fragment
enable
370
Remarks
N/A
By default, TCP fragment attack
prevention is enabled.

Hide quick links:

Table of Contents
loading

This manual is also suitable for:

5900 series

Table of Contents