Security command reference
Security
4-99
iMG/RG Software Reference Manual (IPNetwork Functions)
Options
The following table gives the range of values for each option that can be specified with
this command and a default value (if applicable).
Example
--> security set IDS MaliciousAttackBlock 3600
4.2.7.1.49 SECURITY SET IDS MAXICMP
Syntax
SECURITY SET IDS MAXICMP <MAX>
Description
This command sets the maximum number of ICMP packets per second that are allowed
before an ICMP Flood is detected. An ICMP Flood is a DOS (Denial of Service) attack. An
attacker tries to flood the network with ICMP packets in order to prevent transportation
of legitimate network traffic. Once the maximum number of ICMP packets per second is
reached, an attempted ICMP Flood is detected.
Options
The following table gives the range of values for each option that can be specified with
this command and a Default Value (if applicable).
Example
--> security set IDS MaxICMP 200
4.2.7.1.50 SECURITY SET IDS MAXPING
Syntax
SECURITY SET IDS MAXPING <MAX>
Description
This command sets the maximum number of pings per second that are allowed before an
Echo Storm is detected. Echo Storm is a DOS (Denial of Service) attack. An attacker
sends oversized ICMP datagrams to the system using the ‘ping’ command. This can cause
the system to crash, freeze or reboot, resulting in denial of service to legitimate users.
Once the maximum number of pings per second is reached, an attempted DOS attack is
detected.
Options
The following table gives the range of values for each option that can be specified with
this command and a Default Value (if applicable).
Option
Description
Default Value
duration
The length of time (in seconds) that suspicious
hosts are blocked for once a malicious attack
attempt has been detected.
1800
(30 minutes)
Option
Description
Default Value
max
The maximum number (per second) of ICMP pack-
ets that are allowed before an ICMP Flood attempt
is detected.
100