MicroNugget: How to Prevent TCP Syn-Flood Attacks

Поділитися
Вставка
  • Опубліковано 30 січ 2025

КОМЕНТАРІ • 29

  • @sosexv1
    @sosexv1 12 років тому +2

    I'm on my cisco track. just passed my ccent and studying for my CCNA with cbtnugs. These kind of videos are very informative. thank you!

  • @cbtnuggets
    @cbtnuggets  12 років тому +2

    If you visit our forums (on our website) you can request a series - this way we can track what's been requested & it's popularity. We also then have a way to mark if it's in production.

  • @friction5001
    @friction5001 4 роки тому

    This video is so old but still got the job done thanks

  • @huucyber
    @huucyber 5 років тому +2

    Note: If you want to perform attack, you need to configure access-list on ASA to allow TCP traffic from Outside to DMZ
    conf t
    access-list TCP permit tcp any host
    access-group TCP in interface outside
    end

  • @cbtnuggets
    @cbtnuggets  12 років тому +2

    That's awesome! and thank you!

  • @eduardd7289
    @eduardd7289 6 років тому +2

    Very informative. Thank you !

  • @cbtnuggets
    @cbtnuggets  12 років тому

    If you have any ideas for MicroNugget topics follow the link in the description and submit a few! We read each and every one.

  • @KeithBarker
    @KeithBarker 12 років тому

    Hello Muhammad-
    Those are fantastic ideas! I will add them to my list.
    Thank you.
    Keith

  • @alittax
    @alittax Рік тому

    Great explanation! But what's the next step? Does the firewall wait for some time before it times out a given connection and it opens a new one?

  • @zee-trekking-trails
    @zee-trekking-trails 12 років тому +1

    you should do a micro nugget on cisco ip sla. route tracking etc.
    and 2nd is traffic capture with wireshark. wireshark filters etc.

  • @Taurus.x85
    @Taurus.x85 12 років тому

    Fantastic
    Keith is awesome

  • @cantwaittowatch
    @cantwaittowatch 5 років тому +1

    Thanks for the presentation but what initially confused me was that the new red arrows you drew still might have gone thru the ASA but not directly as depicted, and after applying the policy map or rules, only 5 half filled connections were let thru.

  • @Alireza-zc3kc
    @Alireza-zc3kc 5 років тому +1

    Hey Kieth thanks for this micro nugget. Would you please also create one for asymmetric routing issues while using HSRP that causes unicast flooding in the HSRP device, and how by reducing CAM table aging time euqal or less than ARP table time on HSRP devices it will solve the issue , it is one of the worst explained parts and most confusing parts of the CCNP route book on chapter 2. Thank you in advance

  • @AlexeyTsapaev
    @AlexeyTsapaev 7 років тому +2

    great video! but how ASA manages to intercept those connections and control them? Whats more, a few servers can be under attack. Is ASA CPU that powerful or it is hardware accelerated?

  • @alreid12345
    @alreid12345 12 років тому +1

    AWESOME !!!. Wish you guys could do a Backtrack series ?!?!?!?!?!? :-D

  • @reanitkhmer3325
    @reanitkhmer3325 3 роки тому

    really helpfull. thanks

  • @vivekprajapati7911
    @vivekprajapati7911 4 роки тому

    great sir thanks ...

  • @bijubalan7819
    @bijubalan7819 10 років тому

    Keith a Micronugget on deeper into the Basic ping

    • @cbtnuggets
      @cbtnuggets  10 років тому

      biju balan, You can submit a formal MicroNugget request here: cbt.gg/1axFtY4.

  • @nandorbacso4625
    @nandorbacso4625 2 роки тому

    How is that the ASA doesn't get overwhelmed?

  • @Patrick-ky7ez
    @Patrick-ky7ez 3 роки тому

    Maybe I missed something because I'm new to all this, but how does the ASA not get overwhelmed as well?

    • @cbtnuggets
      @cbtnuggets  3 роки тому +1

      Hi Patrick, thank you for your question!
      The ASA can still be overwhelmed, but there are still several factors to consider. The ASA will be forwarding based on the ACL rules, so if the permit is granted for a set of traffic, it will forward at wire speed for most ASA's. This will bog down the server in question since, the syn handshakes are occurring. To initiate the ASA and have it drop more then x number of open or hanging sync requests, this will help prevent the server from being overwhelmed. The ASA in the mean time will continue to drop those other syn requests as they come in. This will cause either the server to continue normal operations or have a slow poor experience for those who attempt to use that server.
      There is a balance in fine turning the bandwidth of limiting the syn handshakes to the server and what it can handle. A lot of newer firewalls are able to detect these attacks much more efficiently and handle the throughput to servers more effectively, minimizing the attack on a server.
      We hope this is helpful for you. Thank you for learning with us!

  • @SandeepKumar-bv6wl
    @SandeepKumar-bv6wl Місяць тому

    How to protect lan based attack. Asa or firewall blocks wan to lan not lan to lan pc to server attacks inside check this out

  • @zahidsaeed8987
    @zahidsaeed8987 2 роки тому

    hi can you make a video for a life of a packet inside a firewall?

  • @NullsetComputerCo
    @NullsetComputerCo 12 років тому

    favorite nugget

  • @lowvrgamer
    @lowvrgamer 6 років тому +1

    Can You do that in windows10 with a free app?

    • @nt6956
      @nt6956 5 років тому

      do you know if it is possible?

  • @adrianjones241
    @adrianjones241 5 років тому

    So what is a Syn attack?