Solved

Cisco ASA5510 - Configuring Connection Limits and Timeout for Preventing DDoS

Posted on 2014-02-20
8
1,102 Views
Last Modified: 2014-03-12
My public facing DNS were being syn flooded this morning.  I configured a service policy rule on my ASA5510, and set the "Maximum Per Client Connections" to 20.  Its seems to be working, but I am still getting the following messages all the time coming from different outside addresses, targeting my two public facing DNS servers.

Feb 20 2014 08:17:25: %ASA-3-201013: Per-client connection limit exceeded 20/20 for output packet from 38.100.21.67/6573 to x.x.x.134/53 on interface dmz

Is there anything further I can do to help stop this?  I am eventually going to get an SSM for the ASA, but I don't have one yet.
0
Comment
Question by:denver218
  • 4
  • 3
8 Comments
 
LVL 15

Expert Comment

by:Robert Sutton Jr
ID: 39873389
Aside from maybe having your provider block those specific ports upstream, then there really isn't anything you can do atm ... And since we here don't know anything about your net setup take a look at the link below.



http://www.rfc-editor.org/rfc/pdfrfc/rfc3704.txt.pdf
0
 
LVL 4

Author Comment

by:denver218
ID: 39873802
Thanks.  Its a public DNS server so I can't have my provider block udp/53.  They did work with me earlier, and I had them block it for a test, and of course the traffic stopped coming into my network, but my DNS servers then were not functional.
0
 
LVL 28

Expert Comment

by:asavener
ID: 39883197
Your DNS servers should be able to handle significantly more than 20 concurrent connections.
0
Use Case: Protecting a Hybrid Cloud Infrastructure

Microsoft Azure is rapidly becoming the norm in dynamic IT environments. This document describes the challenges that organizations face when protecting data in a hybrid cloud IT environment and presents a use case to demonstrate how Acronis Backup protects all data.

 
LVL 28

Expert Comment

by:asavener
ID: 39883203
Wait... SYN flooding?  Can you just block TCP/53 and allow UDP/53?  That should allow DNS requests to work while blocking the SYN packets.

TCP/53 is only used for zone transfers.
0
 
LVL 4

Author Comment

by:denver218
ID: 39909572
I used to only have UDP/53 open, but now I am being told that for a proper DNS setup TCP/53 should be open because any messages who size exceeds the DNS protocols original 512-byte limit has to use TCP.  I always thought TCP/53 was only for zone transfers, which is why I always closed that port.  Below is the document I've been referred to:

https://tools.ietf.org/html/rfc5966
0
 
LVL 28

Expert Comment

by:asavener
ID: 39909615
There's a configuration setting to increase the maximum size of the DNS packet.... Let me see if I can find it.
0
 
LVL 28

Accepted Solution

by:
asavener earned 500 total points
ID: 39909756
https://supportforums.cisco.com/thread/2013390

earlier versions of PIX (6.3.2 and below), you had to manually configure the DNS fixup to permit DNS packets with the longer length :

fixup protocol dns maximum-length 4096



in more recent versions, it would be covered by :

policy-map type inspect dns preset_dns_map
parameters
message-length maximum 4096


or to increase the response size length:


policy-map global_policy
class inspection_default
inspect dns maximum-length 4096
0
 
LVL 4

Author Closing Comment

by:denver218
ID: 39924323
Thanks.
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you thought ransomware was bad, think again! Doxware has the potential to be even more damaging.
Knowing where your website is hosted is as important as the features you receive, the monthly fee, and the support you receive. Due diligence should be done when choosing your next hosting provider.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

823 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question