H3C SecPath AFC2000-EX0-G Series Abnormal Traffic Cleaning System Configuration Examples-5W100

HomeSupportSecurityH3C SecPath AFC2000H3C SecPath AFC2000Technical DocumentsConfigure & DeployConfiguration ExamplesH3C SecPath AFC2000-EX0-G Series Abnormal Traffic Cleaning System Configuration Examples-5W100
04-TCP Port Protection Configuration Example
Title Size Download
04-TCP Port Protection Configuration Example 900.57 KB

Feature Overview

Description of Typical TCP Configurations in AFC Devices.

This document outlines the standard configurations related to TCP protocols in AFC devices.

TCP port protection allows for specialized settings targeting individual TCP services. It provides defense mechanisms against CC attacks, SYN flood attacks, and other port-based attacks targeting TCP protocol services. Additionally, it enables protocol type filtering to restrict specific protocols and allows editing of protection protocol types for specialized services.

Feature Usage

Document Version Compatibility and Configuration Guidelines
This document is not strictly version-bound to specific software or hardware releases. If discrepancies arise between the document content and the actual product behavior during use, the device's actual status shall take precedence.

All configurations demonstrated in this document were performed and validated in a laboratory environment. The device was reset to its factory default settings before each configuration test. If you have modified your device's configuration, please ensure that your existing settings do not conflict with the examples provided below to guarantee successful implementation.

 

Configuration Guide

H3C Abnormal Traffic Cleaning and Detection System The configuration covers AFD devices, AFC devices, and switch devices. The basic configuration of switch devices is performed via the command line interface (CLI). For the abnormal traffic cleaning device (AFC), both basic configuration and service-related configurations are implemented through the Web interface.

Typical Configuration Example for AFC Defending Against CC Attacks

Introduction

This chapter introduces typical configuration examples of AFC defending against CC attacks. A CC attack is an attack that occupies the server's concurrent connection count, tries to avoid the cache as much as possible and directly reads the database, seeks the most resource-consuming queries when reading the database, preferably queries that cannot use indexes, and performs full-table scans for every query, using the minimum attack resources to achieve the maximum denial-of-service effect.

Usage Restrictions

The configurations described in this section are exclusively applicable to defending against CC attacks, such as HTTP GET FLOOD and HTTP POST FLOOD.

 Example Configuration for Defending Against CC Attacks

Applicable Products and Versions

This configuration is applicable to H3C SecPath AFC devices, with an example of BGP three-layer return flow networking mode.
Software Version: H3C I-Ware Software, Version 7.1, ESS 6401.

Networking Requirements

To enable traffic cleaning for the protected IP 200.2.0.100, an abnormal traffic cleaning system is deployed in bypass mode on the core switching device. The core switch establishes a BGP neighbor relationship with the AFC device through interface G1/0/18 (core switch) and GE1/0 (AFC device) to enable traffic diversion and injection. The networking diagram is shown below.

Figure 01 AFC Bypass Deployment Mode Configuration Networking Diagram

 

Configuration Approach

To enable AFC's capability to defend against CC attacks, configure AFC as follows:

·     Enable TCP port protection for port 80.

·     Activate the web plugin on the port and adopt application-layer source authentication to defend against CC attacks.

Configuration Precautions

·     The TCP port set of the protected server must align with the sequence number of the port protection configuration set.

·     The web plugin can be enabled in two modes: automatic and manual. To enable the plugin automatically, you need to set the "Attack Frequency Detection" threshold based on your live network traffic conditions and empirical experience.

Configuration Steps

Log in to AFC

Access the login page via browser: https://192.168.0.1 (Username: admin, Password: admin). Refer to the figure below.

Figure 02 AFC Web Login Interface

 

Add JavaScript Validation Interaction Configuration

JS validation is the most imperceptible protection method in web-based CC defense, capable of automatically identifying whether the source IP is a bot (zombie computer) or a legitimate client IP address. Configuration is as follows.

Figure 03 Add Rule

 

Add Redirection Page Interactive Verification Configuration

Redirection Page Interaction: Legitimate users access the system-integrated web channel redirection page. Upon successful verification, they can normally open the target website; otherwise, access is blocked. Bots cannot simulate genuine user interactions to pass the verification. Configuration is as follows.

Figure 04 Add Rule

 

Problem Page Interactive Verification Configuration

Interactive challenge-response pages represent a widely adopted security measure, akin to implementing CAPTCHA on websites. Legitimate users must correctly respond to verification prompts to gain access, while unauthorized access attempts are blocked—since botnets (compromised devices) are incapable of simulating human-like interactive responses. Configuration details are as follows:

Figure 05 Add Rule

 

  • Protection-System Config-Http CC you can add custom-defined question and answer verifications.

Figure 06 Custom Question and Answer Verification

 

Verification Configuration

Using tools to simulate a CC attack on the protected host:
Client connections exceeding the configured limit are blocked. As shown in the figure, AFC restricts each client to establish a maximum of 30 connections to port 80. Since 10 clients were simulated, only 300 connections were allowed.

The attack source was added to the blocklist:

The blocking reason is "System Connection Protection."

The protected host entered [SYN] protection mode.

 

Figure 07 Generate a CC attack using tools

 

Figure 08 The attacking host's IP address is blocked

 

Using tools to send a CC attack to the protected host:

The attack frequency exceeds the configured detection threshold of 10. The protected host enters protection mode, and the web plugin is automatically enabled. As shown in the figure.

Figure 09 Generate a CC attack using tools

 

After the plugin is enabled, accessing the protected server's port 80 will display the source authentication page shown in the figure (customization is not currently supported). Since legitimate users are active, they will click "Continue Manually" when prompted. However, botnets lack this capability.

Figure 010 Enable Web Plugin for Protected Website - Redirection Page Interaction

 

Typical Configuration Examples for AFC Defending Against SYN Flood Attacks

Introduction

This document provides configuration examples for defending against SYN Flood attacks.

A SYN Flood attack exploits the "vulnerability" in the three-way handshake process of TCP connection establishment. It sends SYN packets with forged source addresses through raw sockets. This prevents the target host from ever completing the three-way handshake, exhausts the system's protocol stack queue, ties up resources that cannot be released, and ultimately results in denial of service. It is one of the most prevalent forms of DDoS attacks on the internet.

Usage Restrictions

The configurations described in this section are applicable only to defending against SYN Flood attacks.

Typical Configuration Examples for Defending Against SYN Flood Attacks

Applicable Products and Versions

Software Version: H3C I-Ware Software, Version 7.1, ESS 6401

Networking Requirements

To enable traffic cleaning for the protected IP 200.2.0.100 against attacks, an abnormal traffic cleaning system is deployed in series at the core switch device. The networking topology is shown in the figure.

Figure 01  Standalone Series Deployment Mode Configuration and Networking for AFC

 

 

Configuration Approach

To enable AFC's capability to defend against SYN Flood attacks, configure AFC according to the following approach:
Adjust the SYN Flood protection threshold in the global parameters based on specific application requirements, leveraging the built-in protection algorithm to intercept attack packets. If the attack frequency does not exceed the SYN Flood protection threshold, AFC will proxy the three-way handshake between the server and client. If the attack frequency exceeds the threshold, AFC will drop the first packet sent by the client and then proxy the three-way handshake between the server and client.

Configuration Precautions

For SYN Flood attacks, AFC can directly intercept attack packets using its built-in protection algorithm. Therefore, the key configuration lies in adjusting the SYN Flood protection threshold in the global parameters based on specific application requirements.

Configuration Steps

 Log in to AFC

Access the login page via browser: https://192.168.0.1/ (Username: admin, Password: admin). Refer to the figure below.

Figure 02 AFC Web Login

 

Viewing SYN Protection

  • Navigate to [Protection ] [Rules Config] [Applied Rules], click Add, and the SYN protection module will be enabled by default for all addresses.

Figure 03 View Rules

 

Configuration Validation

Send SYN Flood Attack Traffic to the Test Server

Deploy a test client server either on the core network equipment within the user's network or externally connected to the user's network. Utilize packet generation tools (e.g., Druid, RDDoS, Xcap) or specialized testing instruments to simulate a SYN Flood attack toward the test server. Ensure the attack packet rate exceeds the threshold value set for "SYN Packets Per Second" under [Protection] [Rules Config] [Trigger Rules] [Global Trigger Rules ].

Figure 04 Default Protection Threshold S_globar Trigger

 

 

Default Protection ThresholdS_globar Trigger Counting and triggering defense mechanisms independently for each server IP address. Specifically, when the packet reception rate of a server exceeds the predefined threshold values listed below, that specific server IP will enter the corresponding defense state, while other IP addresses remain unaffected.

TCP Packets Per Second: When the reception rate of TCP protocol packets with Fin or Urg flag bits by a specific IP address in the AFC system exceeds the configured threshold value, the server will enter the TCP Flood defense state.

UDP Packets Per Second: When the reception rate of UDP protocol packets by a specific IP address in the AFC system exceeds the configured threshold value, the server will enter the UDP Flood defense state.

ICMP Packets Per Second: When the reception rate of ICMP protocol packets by a specific IP address in the AFC system exceeds the configured threshold value, the server will enter the ICMP Flood defense state.

SYN Packets Per Second: When the reception rate of TCP protocol packets with the SYN flag bit by a specific IP address in the AFC system exceeds the configured threshold value, the server will enter the SYN Flood defense state. In this state, each incoming SYN packet received by the server undergoes source validation.

SYN Packets Per Second: When the reception rate of TCP protocol packets with the SYN flag bit by a specific IP address in the AFC system exceeds the configured threshold value, the server will enter the SYN Flood defense state. In this state, each incoming SYN packet received by the server undergoes source validation.

 ACK & RST Packets Per Second: When the reception rate of TCP protocol packets carrying ACK or RST flag bits by a specific IP address in the AFC system exceeds the configured threshold value, the server will enter the TCP ACK Flood defense state.

 Other Protocol Packets Per Second: When the reception rate of non-TCP, non-UDP, and non-ICMP protocol packets by a specific IP address in the AFC system exceeds the configured threshold value, the server address will enter the IP Flood defense state.

View the traffic received by the test server

Navigate to [Protection] → [Global Status] → [Server List] in the AFC system:

Select [Input Package(pps)] to view the packet reception rate of the test server.

Figure 05 View the input packet rate of the test server

 

View the intercepted traffic of the test server.

Select [Input Blocked (Mbps)] to view the input traffic interception information of the test server.

Figure 06 View the input traffic interception information of the test server.

 

View the attack logs of the test server.

Navigate to [Log Center] [Attack Log] to query the attack log records of the test server:

Figure 07 View the attack logs of the test server.

 

The SYN flood attack against the test server has been successfully mitigated.

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Intelligent Storage
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
  • Technical Blogs
All Support
  • Become A Partner
  • Partner Policy & Program
  • Global Learning
  • Partner Sales Resources
  • Partner Business Management
  • Service Business
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us