Security
Intrusion Detection Settings
iMG/RG Software Reference Manual (IPNetwork Functions)
4-64
4.2.4.2 How Port Scanning works - Configuring Port Scanning
The device detects an attempted port scan if it receives more than 5 scanning packets (e.g., SYN/ ACK, FIN or
RST packets) per second from a single host. To modify this default threshold:
security set IDS scanthreshold <max>
The device counts the maximum number of scan packets allowed per second over a 60 second period. To mod-
ify this default duration
security set IDS scanperiod <duration>
If the number of scanning packets counted within the specified duration is greater than the scan threshold set,
the suspected attacker is blocked for 86400 seconds (24 hours). To modify this default duration, enter:
security set IDS SCANattackblock <duration>
Echo scan, Xmas Tree scan, IMAP scan on the contrary are blocked using the MaliciousAttack attribute. Block
duration default is set to 30 minutes, to change it:
security set IDS MaliciousAttackBlock <duration>
4.2.4.3 Denial of Service (DoS) Attacks
There are two main types of DoS attack:
•
Flood attacks
- an attacker tries to overload your device by flooding it with packets. Whilst your device tries
to cope with this sudden influx of packets, it causes delays to the transport of legitimate packets or prevents
the network from transporting legitimate traffic altogether.
•
Logic
or
software attacks
- a small number of corrupt packets are designed to exploit known software bugs
on the target system.
Back Orifice scan
Back Orifice and Back Orifice 2k are Trojan Horse
attacks for Win-
dows 95/98/NT. Once installed on the victim’s PC, the attacker com-
monly listens on UDP ports 31337, 31338 (Back Orifice) and 54320,
54321 (Back Orifice 2k). The attacker can then remotely perform illicit
activities.
SubSeven attack
SubSeven and SubSeven 2.1 are Trojan Horse
attacks for Windows
platforms. Once installed on the victim’s PC, the attacker uses TCP
ports 1243, 6711, 6712, 6713 (SubSeven) and 27374 (SubSeven 2.1) to
remotely perform illicit activities
Scan Attack
Description