I've wrote post about Network Attack previously and now I'd like to share how to configure IPS function in HP MSR Series Customer Edge Router.
In general, this kind of router are provided by ISP and Engineer/Technician are configure for you if you pay for the service fees but they will not enable IPS function for you mostly.
If you didn't expense extra service fees for router configuration, then it's fall on your responsibility.
Anyway, the router must enable IPS function either you or they configure it.
Why? It is easy to get our IP address and get attack my attacker nowadays.
OK. Let's start it now.
- First you have to configure attack defense policy
- Then apply on router interfaces respectively.
Use below commands to create Single-Packet Attack policy and prevent
system-view
attack-defense policy 1
signature-detect fraggle enable
signature-detect icmp-redirect enable
signature-detect large-icmp enable
signature-detect route-record enable
signature-detect smurf enable
signature-detect source-route enable
signature-detect tcp-flag enable
signature tracert enable
signature winnuke enable
signature-detect large-icmp max-length 2000 (4000 bytes by default and you can customize the value if you want)
signature-detect action drop-packet
Use below commands to create Scanning Attack policy and prevent
system-view
attack-defense policy 1
defense scan enable
defense scan max-rate 2000 (4000 bytes by default and you can customize the value if you want)
defense scan add-to-blacklist
defense scan blacklist-timeout 10
quit
blacklist enable
Use below commands to create Flood-Attack policy and prevent
Flood Attack is to prevent Server located in DMZ/LAN segment usually.
system-view
attack-defense policy 1
defense syn-flood enable
defense syn-flood rate-threshold high 1000 low 750 (default is 1000 packets per second and 750 packets per second. But you can customize if you want)
defense syn-flood ip x.x.x.x rate-threshold high xxxx low xxx (You can customize IP and rate value if you want or just leave it default as this is optional)
defense sync-flood action drop-packet
system-view
attack-defense policy 1
defense icmp-flood enable
defense icmp-flood rate-threshold high 1000 low 750 (default is 1000 packets per second and 750 packets per second. But you can customize if you want)
defense icmp-flood ip x.x.x.x rate-threshold high xxxx low xxx (You can customize IP and rate value if you want or just leave it default as this is optional)
defense icmp-flood action drop-packet
system-view
attack-defense policy 1
defense udp-flood enable
defense udp-flood rate-threshold high 1000 low 750 (default is 1000 packets per second and 750 packets per second. But you can customize if you want)
defense udp-flood ip x.x.x.x rate-threshold high xxxx low xxx (You can customize IP and rate value if you want or just leave it default as this is optional)
defense udp-flood action drop-packet
Use below commands to apply configured policy on each WAN and DMZ/LAN interfaces.
system-view
interface gi0/0
attack-defense apply policy 1
interface gi0/1
attack-defense apply policy 1
Well. We are done now and do not forget to save configuration.
You router performance will be a bit slow but it is better than you got attack by attacker.
I've used above command in HP MSR930 Router and you can also configure some of attack defense function in Cisco and other brand router. Yes, you might need OS license for some certain feature for IPS as well.
Have a good day.
(Be knowledgeable, pass it on then)
In general, this kind of router are provided by ISP and Engineer/Technician are configure for you if you pay for the service fees but they will not enable IPS function for you mostly.
If you didn't expense extra service fees for router configuration, then it's fall on your responsibility.
Anyway, the router must enable IPS function either you or they configure it.
Why? It is easy to get our IP address and get attack my attacker nowadays.
OK. Let's start it now.
- First you have to configure attack defense policy
- Then apply on router interfaces respectively.
Use below commands to create Single-Packet Attack policy and prevent
system-view
attack-defense policy 1
signature-detect fraggle enable
signature-detect icmp-redirect enable
signature-detect large-icmp enable
signature-detect route-record enable
signature-detect smurf enable
signature-detect source-route enable
signature-detect tcp-flag enable
signature tracert enable
signature winnuke enable
signature-detect large-icmp max-length 2000 (4000 bytes by default and you can customize the value if you want)
signature-detect action drop-packet
Use below commands to create Scanning Attack policy and prevent
system-view
attack-defense policy 1
defense scan enable
defense scan max-rate 2000 (4000 bytes by default and you can customize the value if you want)
defense scan add-to-blacklist
defense scan blacklist-timeout 10
quit
blacklist enable
Use below commands to create Flood-Attack policy and prevent
Flood Attack is to prevent Server located in DMZ/LAN segment usually.
system-view
attack-defense policy 1
defense syn-flood enable
defense syn-flood rate-threshold high 1000 low 750 (default is 1000 packets per second and 750 packets per second. But you can customize if you want)
defense syn-flood ip x.x.x.x rate-threshold high xxxx low xxx (You can customize IP and rate value if you want or just leave it default as this is optional)
defense sync-flood action drop-packet
system-view
attack-defense policy 1
defense icmp-flood enable
defense icmp-flood rate-threshold high 1000 low 750 (default is 1000 packets per second and 750 packets per second. But you can customize if you want)
defense icmp-flood ip x.x.x.x rate-threshold high xxxx low xxx (You can customize IP and rate value if you want or just leave it default as this is optional)
defense icmp-flood action drop-packet
system-view
attack-defense policy 1
defense udp-flood enable
defense udp-flood rate-threshold high 1000 low 750 (default is 1000 packets per second and 750 packets per second. But you can customize if you want)
defense udp-flood ip x.x.x.x rate-threshold high xxxx low xxx (You can customize IP and rate value if you want or just leave it default as this is optional)
defense udp-flood action drop-packet
Use below commands to apply configured policy on each WAN and DMZ/LAN interfaces.
system-view
interface gi0/0
attack-defense apply policy 1
interface gi0/1
attack-defense apply policy 1
Well. We are done now and do not forget to save configuration.
You router performance will be a bit slow but it is better than you got attack by attacker.
I've used above command in HP MSR930 Router and you can also configure some of attack defense function in Cisco and other brand router. Yes, you might need OS license for some certain feature for IPS as well.
Have a good day.
(Be knowledgeable, pass it on then)
Comments
Post a Comment