Configuring Rate-Based Attack Prevention
Note | This section applies to Snort 2 preprocessors. For information on Snort 3 inspectors, see https://www.cisco.com/go/snort3-inspectors. |
You can configure rate-based attack prevention at the policy level to stop SYN flood attacks. You can also stop excessive connections from a specific source or to a specific destination.
Procedure
Step 1 | Choose Network Analysis Policy or , then click Network Analysis Policies. , then click
| ||
Step 2 | Click Snort 2 Version next to the policy you want to edit. | ||
Step 3 | Click Edit () next to the policy you want to edit. If View () appears instead, the configuration belongs to an ancestor domain, or you do not have permission to modify the configuration. | ||
Step 4 | Click Settings. | ||
Step 5 | If Rate-Based Attack Prevention under Specific Threat Detection is disabled, click Enabled. | ||
Step 6 | Click Edit () next to Rate-Based Attack Prevention. | ||
Step 7 | You have two choices:
| ||
Step 8 | Specify how you want to track traffic:
| ||
Step 9 | Specify the triggering rate for the rate tracking setting:
Devices load-balance inspection across internal resources. When you configure rate-based attack prevention, you configure the triggering rate per resource, not per device. If rate-based attack prevention is not working as expected, you may need to lower the triggering rate. It triggers alert, if users send too many connection attempts within prescribed time intervals. Hence it is recommended to rate limit the rule. For help determining the correct rate, contact Support. | ||
Step 10 | To drop packets matching the rate-based attack prevention settings, check the Drop check box. | ||
Step 11 | In the Timeout field, enter the time period after which to stop generating events (and if applicable, dropping) for traffic with the matching pattern of SYNs or simultaneous connections.
| ||
Step 12 | Click OK. | ||
Step 13 | To save changes you made in this policy since the last policy commit, click Policy Information, then click Commit Changes. If you leave the policy without committing changes, changes since the last commit are discarded if you edit a different policy. |
What to do next
-
Deploy configuration changes.