This blog was originally started to better help me understand the technologies in the CCIE R&S blueprint; after completing the R&S track I have decided to transition the blog into a technology blog.
CCIE #29033
This blog will continue to include questions, troubleshooting scenarios, and references to existing and new technologies but will grow to include a variety of different platforms and technologies. Currently I have created over 185 questions/answers in regards to the CCIE R&S track!! Note: answers are in the comment field or within "Read More" section.
You can also follow me on twitter @FE80CC1E
How would you intercept and drop random TCP connections to servers 192.168.1.1, 192.168.2.2 as well as the network 10.0.1.0/24?
1 comments:
TCP intercept helps mitigate SYN flood attacks and validates TCP connections requests.
Configuration example
config#ip tcp intercept list 100
config#ip tcp intercept drop-mode random
config#ip tcp intercept mode intercept (default)
config#access-list 100 permit ip any host 192.168.1.1
config#access-list 100 permit ip any host 192.168.2.2
config#access-list 100 permit ip any 10.0.1.0 0.0.0.255
show tcp intercept statistics
Intercepting new connections using access-list 100
0 incomplete, 0 established connections (total 0)
0 connection requests per minute
show tcp intercept connections
Incomplete:
Client Server State Create Timeout Mode
Established:
Client Server State Create Timeout Mode
Post a Comment