Attack policies

An attack can be a single packet designed to cause a system to fail or hang. An attack can also consist of multiple packets designed to consume a limited resource, which causes a network, system, or application to be unavailable to its intended users (denial of service). You can use intrusion detection services (IDS) attack policy to activate attack detection for one or more categories of attacks independently of each other. In general, the types of actions that you can specify for an attack policy are event logging, statistics gathering, packet tracing, and discarding of the attack packets. Most attack checking is performed for inbound packets to a stack.

IDS includes the following categories of attacks:

For each attack category (for example, restricted IP protocol) the single highest priority rule is mapped at policy change.

One or more notification options can be specified in the action to provide the wanted documentation of detected attacks.

For IDS attack policy, the notification options enable attack events to be logged to syslogd and to the system console. The console messages provide a subset of the information provided in the syslogd messages.

For all attack categories except flood, EE XID flood, TCP queue size, and global TCP stall, a single packet triggers an event. To prevent message flooding to the system console, you should use the maximum event message parameter to specify the maximum number of console messages to be logged per attack category within a 5-minute interval. To prevent message flooding to syslogd, a maximum of 100 event messages per attack category are logged to syslogd within a 5-minute interval. Specify the syslogd detail parameter with the global TCP stall attack type to request that a syslogd message be generated for each stalled connection when a global TCP stall is detected.

For IDS attack policy, the statistics action provides a count of the number of attack events detected during the statistics interval. The count of attacks is kept separately for each category of attack (for example, malformed packet events) and a separate statistical record is generated for each. If you want to receive statistics for attacks, you should specify exception statistics. With exception statistics, a statistical record is generated for the category of attack only if the count of attacks is nonzero. If you request normal statistics, a record is generated for every statistics interval regardless of whether an attack has been detected during that interval.

If you want to provide overrides to the interface flood parameters (interface flood minimum percentage parameter and interface flood minimum discard parameter), you should not use exception statistics. In this case, use normal statistics for a period for the flood attack category to collect data to help determine the appropriate policy parameter values. After you determine the appropriate values, specify exception statistics.

For IDS attack policy, the trace data and trace record size parameters indicate whether packets associated with attack events are to be traced. For all attack categories except flood, EE XID flood, TCP queue size, and global TCP stall, a single packet triggers an event and the packet is traced. To prevent trace flooding, a maximum of 100 attack packets per attack category are traced within a 5-minute interval.

For all attack categories except EE XID flood, TCP queue size, and global TCP stall, you can specify that packets associated with attack events should be discarded. However, malformed and flood packets are always discarded regardless of this setting.

For the TCP queue size attack category, you can specify that connections associated with attack events should be reset.

For the global TCP stall attack category, you can specify that stalled connections should be reset when a global TCP stall condition is detected.

The EE XID flood attack category monitors the number of XID exchange timeouts. There is no associated packet to discard or connection to reset.

An action can be unique to a specific category of attack (for example, malformed) or shared by one or more categories of attacks. If an action is shared, statistical data is still kept separately for each type of attack. Also, the maximum console message limit is enforced individually for each category of attack.