Solved

Cisco ASA5510 - Configuring Connection Limits and Timeout for Preventing DDoS

Posted on 2014-02-20
8
1,132 Views
Last Modified: 2014-03-12
My public facing DNS were being syn flooded this morning.  I configured a service policy rule on my ASA5510, and set the "Maximum Per Client Connections" to 20.  Its seems to be working, but I am still getting the following messages all the time coming from different outside addresses, targeting my two public facing DNS servers.

Feb 20 2014 08:17:25: %ASA-3-201013: Per-client connection limit exceeded 20/20 for output packet from 38.100.21.67/6573 to x.x.x.134/53 on interface dmz

Is there anything further I can do to help stop this?  I am eventually going to get an SSM for the ASA, but I don't have one yet.
0
Comment
Question by:denver218
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 3
8 Comments
 
LVL 15

Expert Comment

by:Robert Sutton Jr
ID: 39873389
Aside from maybe having your provider block those specific ports upstream, then there really isn't anything you can do atm ... And since we here don't know anything about your net setup take a look at the link below.



http://www.rfc-editor.org/rfc/pdfrfc/rfc3704.txt.pdf
0
 
LVL 4

Author Comment

by:denver218
ID: 39873802
Thanks.  Its a public DNS server so I can't have my provider block udp/53.  They did work with me earlier, and I had them block it for a test, and of course the traffic stopped coming into my network, but my DNS servers then were not functional.
0
 
LVL 28

Expert Comment

by:asavener
ID: 39883197
Your DNS servers should be able to handle significantly more than 20 concurrent connections.
0
How our DevOps Teams Maximize Uptime

Our Dev teams are like yours. They’re continually cranking out code for new features/bugs fixes, testing, deploying, responding to production monitoring events and more. It’s complex. So, we thought you’d like to see what’s working for us. Read the use case whitepaper.

 
LVL 28

Expert Comment

by:asavener
ID: 39883203
Wait... SYN flooding?  Can you just block TCP/53 and allow UDP/53?  That should allow DNS requests to work while blocking the SYN packets.

TCP/53 is only used for zone transfers.
0
 
LVL 4

Author Comment

by:denver218
ID: 39909572
I used to only have UDP/53 open, but now I am being told that for a proper DNS setup TCP/53 should be open because any messages who size exceeds the DNS protocols original 512-byte limit has to use TCP.  I always thought TCP/53 was only for zone transfers, which is why I always closed that port.  Below is the document I've been referred to:

https://tools.ietf.org/html/rfc5966
0
 
LVL 28

Expert Comment

by:asavener
ID: 39909615
There's a configuration setting to increase the maximum size of the DNS packet.... Let me see if I can find it.
0
 
LVL 28

Accepted Solution

by:
asavener earned 500 total points
ID: 39909756
https://supportforums.cisco.com/thread/2013390

earlier versions of PIX (6.3.2 and below), you had to manually configure the DNS fixup to permit DNS packets with the longer length :

fixup protocol dns maximum-length 4096



in more recent versions, it would be covered by :

policy-map type inspect dns preset_dns_map
parameters
message-length maximum 4096


or to increase the response size length:


policy-map global_policy
class inspection_default
inspect dns maximum-length 4096
0
 
LVL 4

Author Closing Comment

by:denver218
ID: 39924323
Thanks.
0

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Uncontrolled local administrators groups within any organization pose a huge security risk. Because these groups are locally managed it becomes difficult to audit and maintain them.
Ready for our next Course of the Month? Here's what's on tap for June.
Both in life and business – not all partnerships are created equal. Spend 30 short minutes with us to learn:   • Key questions to ask when considering a partnership to accelerate your business into the cloud • Pitfalls and mistakes other partners…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

729 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question