Improve company productivity with a Business Account.Sign Up

x
?
Solved

CSS 11501 DOS attack white list

Posted on 2008-10-13
4
Medium Priority
?
862 Views
Last Modified: 2013-12-09
Hello..... is it possible to white list a network or host address? I have a situation where a NAT'ed ip is being blocked possibly because of the number of connections coming through. Any input will be appreciated. Thanks.
0
Comment
Question by:cavacamite
  • 2
  • 2
4 Comments
 
LVL 32

Expert Comment

by:harbor235
ID: 22707897


CSS perfroms NAT, it is also a content service device, load balancer, etc .... The CSS doe snot handle spam or deal with DOS attacks.

harbor235 ;}
0
 

Author Comment

by:cavacamite
ID: 22708014
Thanks. See the DOS output below. The source address is the one experiencing problems accessing the destination ip. The CSS isn't configured to block anything. Could there be any default values on the CSS causing the problem?
DOS Attack Event  1:
First Attack: 10/13/2008 15:47:56
Last Attack:  10/13/2008 16:09:01
Source Address: A.B.C.D  Destination Address: A.B.R.T
Event Type: SYN Attack Total Attacks: 402

0
 
LVL 32

Accepted Solution

by:
harbor235 earned 2000 total points
ID: 22711272


The DOS feature on the CSS is informational only, it provides statistics on potential attacks and allows you to send SNMP traps to alrt you, it doe snot perfrom DOS mitigation. You can accumulate statistics and you can also reset those statistics for monitoring purposes. I did not this feature existed until yooumade me look at it, thanx

http://www.cisco.com/en/US/docs/app_ntwk_services/data_center_app_services/css11500series/v8.20/configuration/administration/guide/SNMP.html#wp1051871

harbor235 ;}
0
 

Author Comment

by:cavacamite
ID: 22712426
Thanks very much for your help. That means back to troubleshooting the issue.
0

Featured Post

Worried about phishing attacks?

90% of attacks start with a phish. It’s critical that IT admins and MSSPs have the right security in place to protect their end users from these phishing attacks. Check out our latest feature brief for tips and tricks to keep your employees off a hackers line!

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Forget those services on TV trying to sell you software – that’s step one.  Almost all of the software you need should be available for free.  The tricky part is doing the work.  If you are not comfortable performing these steps yourself, contact a …
Quality of Service (QoS) options are nearly endless when it comes to networks today. This article is merely one example of how it can be handled in a hub-n-spoke design using a 3-tier configuration.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

595 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question