ServerIron ADX Security Guide 125
53-1002440-03
DDoS protection 5
Configuring a security filter
Configuring a a security filter requires you to define it by name and configure rules within it as
shown in the following.
ServerIronADX(config)# security filter filter1
ServerIronADX(config-sec-filter1)#rule xmas-tree drop
Syntax: security filter <filter-name>
The <filter-name> variable specifies the filter being defined that will then be bound to a port.
The rule command defines the attack method that is being filtered for. For each rule, you can
configure whatever action needs to be taken if an attack occurs. The ServerIron ADX can log the
attack and drop the attacking packet. Rules that can be used are described in Tables 12 thorugh
17 of t his chap ter.
Some rules are hardware-based and are programmed in the CAM. For these rules, the default
action is to drop the packet. These rules cannot be logged, and no message can be logged when an
attack occurs. But there are counters that you can check to determine if an attack has occurred.
Example
ServerIronADX(config)# security filter filter1
ServerIronADX(config-sec-filter1)# rule xmas-tree log
ServerIronADX(config-sec-filter1)# rule address-sweep 1 3 drop log
NOTE
There is no set limit on the number of filters that can be configured on a ServerIron ADX but a
maxi mum of 10 rul es can be b oun d to a si ngl e in terface. The global limit depends upon the available
memory.
Configuring a Generic Rule
Apart from regular rules, such as those configured above, there is also a generic rule. A generic rule
needs to be defined before it can be bound to a filter. In the following example, a rule (gen1) is
configured to match a tcp packet with source-ip greater than 10.10.1.101, a tcp dest-port greater
than 20 and a string "400" at the 3rd byte offset from l4-data.
ServerIronADX(config)# security generic gen1
ServerIronADX(config-sec-gen-gen1)# ip-source gteq ip 10.10.1.101
ServerIronADX(config-sec-gen-gen1)# tcp-dest gt val 20
ServerIronADX(config-sec-gen-gen1)# l4-data 3 eq str "400"
Syntax: {no} security generic <generic-rule-name>
The <generic-rule-name> variable specifies the generic rule defined that will then be bound to a
filter.
The following conditions can be applied to any of the fields in the mac-header, ip-header, l4-header
(TCP/UDP), and l4-data offset to create generic rules:
eq equals
gt greater-than
gteq greater-than-o r-equals