Juniper Networks
Log in
|
How to Buy
|
Contact Us
|
United States (Change)
Choose Country
Close

Choose Country

North America

  • United States

Europe

  • Deutschland - Germany
  • España - Spain
  • France
  • Italia - Italy
  • Россия - Russia
  • United Kingdom

Asia Pacific

  • Asean Region (Vietnam, Indonesia, Singapore, Malaysia)
  • Australia
  • 中国 - China
  • India
  • 日本 - Japan
  • 대한민국 - Korea
  • 台灣 - Taiwan
Solutions
Products & Services
Company
Partners
Support
Education
Community
Security Intelligence Center

Technical Documentation

Support
Technical Documentation
Content Explorer New
 
Enterprise MIBs
 
EOL Documentation
 
Feature Explorer Login required New
 
File Format Help
 
Glossary
 
Portable Libraries
 
 
Home > Support > Technical Documentation > JunosE Software > Protecting Against TCP Out-of-Order DoS Attacks
Print
Rate and give feedback:  Feedback Received. Thank You!
Rate and give feedback: 
Close
This document helped resolve my issue.  Yes No

Additional Comments

800 characters remaining

May we contact you if necessary?

Name:  
E-mail: 
Submitting...
 

Related Documentation

  • Monitoring TCP Statistics for IPv6
  • Monitoring the TCP Resequencing Buffer Management Functions
  • Monitoring TCP Statistics for IP
  • tcp resequence-buffers connection-maximum
  • tcp resequence-buffers default-connection-maximum
  • tcp resequence-buffers default-vr-maximum
  • tcp resequence-buffers global-maximum
  • tcp resequence-buffers vr-maximum
 

Protecting Against TCP Out-of-Order DoS Attacks

You can use the group of tcp resequence-buffers commands to help protect the router from TCP out-of-order packet DoS attacks.

TCP guarantees that applications receive data in order. This means that TCP buffers any out-of-order packets it receives until ordered delivery can occur.

To prevent connections from consuming too many resources, TCP limits the amount of data it accepts to the number of data bytes that the receiver is willing to receive and buffer. TCP does not take into account the buffering scheme that the receiver uses. If the receiver uses a fixed-size receive buffer (that is, buffering all packets) regardless of length, a packet that contains only one data byte might consume many data bytes of buffer space, but only one byte of TCP space.

Under these conditions, an attacker can send a large number of 1-byte packets to an E Series router in which each packet is buffered, consuming an entire packet buffer and eventually consuming a large amount of resources.

To defend against this sort of attack, you can set defaults and limits on the number of outstanding buffers on reordering queues. You can configure these defaults and limits on a per-router, per-virtual router, or per-connection within the virtual router basis.

You can protect the router from TCP out-of-order packet DoS attacks with the following tasks:

  • Limiting TCP Resequence Buffers per Router
  • Limiting TCP Resequence Buffers per Virtual Router
  • Limiting TCP Resequence Buffers per Connection

Limiting TCP Resequence Buffers per Router

To limit the number of outstanding buffers on the entire router:

  • Issue the tcp resequence-buffers global-maximum command in Global Configuration mode.
    host1(config)#tcp resequence-buffers global-maximum

    You can specify a value of zero (0) to turn off the limit. You can use the no version to revert the global maximum buffer value to its default, 1000 buffers.

Limiting TCP Resequence Buffers per Virtual Router

You can limit the number of outstanding buffers on existing or newly established virtual routers using the tcp resequence-buffers vr-maximum command and tcp resequence-buffers default-vr-maximum commands.

To specify the default buffer limit assigned to all virtual routers when the virtual router is established:

  • Issue the tcp resequence-buffers default-vr-maximum command in Global Configuration mode.
    host1(config)#tcp resequence-buffers default-vr-maximum 200

    You can specify a value of zero (0) to turn off the limit assignment. You can use the no version to revert the virtual router maximum value to its default, 100 buffers.

To define the maximum number of buffers that the current or specified virtual router can use:

  • Issue the tcp resequence-buffers vr-maximum command in Global Configuration mode.
    host1(config)#tcp resequence-buffers vr-maximum

    You can specify a value of zero (0) to turn off the limit assignment. You can use the no version to revert the virtual router maximum value to its default, 100 buffers.

Limiting TCP Resequence Buffers per Connection

You can limit the number of outstanding buffers on existing or newly established connections using the tcp resequence-buffers connection-maximum command and tcp resequence-buffers default-connection-maximum commands.

To define the maximum number of buffers that connections on the current or specified virtual router can use:

  • Issue the tcp resequence-buffers connection-maximum command in Global Configuration mode.
    host1(config)#tcp resequence-buffers connection-maximum 50

    You can specify a value of zero (0) to turn off the connection maximum. You can use the no version to revert the connection maximum value to its default, 10 buffers.

To specify the default buffer limit assigned to all TCP connections on a virtual router unless a specific limit is set for the virtual router in which the connection is established.

  • Issue the tcp resequence-buffers default-connection-maximum command in Global Configuration mode.
    host1(config)#tcp resequence-buffers default-connection-maximum 100

    You can specify a value of zero (0) to turn off the connection maximum. You can use the no version to revert the connection maximum value to its default, 10 buffers.

 

Related Documentation

  • Monitoring TCP Statistics for IPv6
  • Monitoring the TCP Resequencing Buffer Management Functions
  • Monitoring TCP Statistics for IP
  • tcp resequence-buffers connection-maximum
  • tcp resequence-buffers default-connection-maximum
  • tcp resequence-buffers default-vr-maximum
  • tcp resequence-buffers global-maximum
  • tcp resequence-buffers vr-maximum
 

Published: 2012-06-20

 
  • About Juniper
  • Investor Relations
  • Press Releases
  • Newsletters
  • Juniper Offices
  • Green Networking
  • Resources
  • How to Buy
  • Partner Locator
  • Image Library
  • Visio Templates
  • Security Center
  • Community
  • Forums
  • Blogs
  • Junos Central
  • Social Media
  • Developers
  • Support
  • Technical Documentation
  • Knowledge Base (KB)
  • Software Downloads
  • Product Licensing
  • Contact Support
Site Map / RSS Feeds / Careers / Accessibility / Feedback / Privacy & Policy / Legal Notices
Copyright© 1999-2012 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out