Configuring Rate-Based Attack Prevention
|
This section applies to Snort 2 preprocessors. For information on Snort 3 inspectors, see https://www.cisco.com/go/snort3-inspectors. |
You can configure rate-based attack prevention at the policy level to stop SYN flood attacks. You can also stop excessive connections from a specific source or to a specific destination.
Procedure
1 |
Choose Network Analysis Policy or , and then click Network Analysis Policies. , and then click
|
||
2 |
Click Snort 2 Version next to the policy you want to edit. |
||
3 |
Click Edit ( If View ( |
||
4 |
Click Settings. |
||
5 |
If Rate-Based Attack Prevention under Specific Threat Detection is disabled, click Enabled. |
||
6 |
Click Edit ( |
||
7 |
You have two choices:
|
||
8 |
Specify how you want to track traffic:
|
||
9 |
Specify the triggering rate for the rate tracking setting:
Devices load-balance inspection across internal resources. When you configure rate-based attack prevention, you configure the triggering rate per resource, not per device. If rate-based attack prevention is not working as expected, you may need to lower the triggering rate. It triggers alert, if users send too many connection attempts within prescribed time intervals. Hence it is recommended to rate limit the rule. For help determining the correct rate, contact Support. |
||
10 |
To drop packets matching the rate-based attack prevention settings, check the Drop check box. |
||
11 |
In the Timeout field, enter the time period after which to stop generating events (and if applicable, dropping) for traffic with the matching pattern of SYNs or simultaneous connections.
|
||
12 |
Click OK. |
||
13 |
To save changes you made in this policy since the last policy commit, click Policy Information, then click Commit Changes. If you leave the policy without committing changes, changes since the last commit are discarded if you edit a different policy. |
What to do next
-
Deploy configuration changes.