Deception

This help contains the following topics:

Introduction

Deception is a cooperative attack prevention approach that protects intranet users from further attacks when the attacker has intruded into the intranet. The device cooperates with a decoy server to provide deception functions.

Decoy server

A decoy server is a threat perception and traceability system, which can decoy attackers to interact with it deeply through well-constructed simulation environment, analyze and trace the attack behaviors, and protect the real network from attacks.

After deception is enabled, the device acts as the agent of the decoy server to interact the attacker, decoy the attack traffic to the decoy server for analysis, and forward the response traffic from the decoy server to the attacker.

Decoy network

Decoy networks are used for static deception. When the device detects that an attacker initiates scanning or any form of access to an IP address in a decoy network, no matter whether the IP address is online or not, the device will immediately enter the deception state and lure the attacker's subsequent traffic to the decoy server for in-depth analysis.

Detection network

Detection networks are used for offline IP deception. The device continuously monitors the ARP requests sent to the detection networks. The device has the following deception modes:

Deception allowlist

The deception allowlist specifies the deception exceptions. It can contain source address allowlist entries and destination address allowlist entries.

Restrictions and guidelines

Configure deception

  1. Create a deception allowlist (optional)

    1. Click the Policies tab.

    2. In the navigation pane, select Active Defense > Deception.

    3. Click the Allowlist tab.

    4. Click Create.

    5. In the dialog box that opens, configure allowlist entry parameters, and then click OK.

      Table-1 Deception allowlist configuration items

      Item

      Description

      IPv4 address/mask

      IPv4 address and mask of the allowlist entry.

      The IPv4 address cannot be 0.0.0.0 or 255.255.255.255.

      Address type

      Type of the IP address of the deception allowlist entry.

      • Source: Source IP address. The device will not decoy the traffic initiated by the IP address.

      • Destination: Destination IP address. The device will not decoy the traffic accessing the IP address.

      VRF

      VPN instance to which the deception allowlist belongs. By default, the value is Public network, which means the IP address belongs to the public network.

  2. Create a decoy network (optional)

    1. Click the Policies tab.

    2. In the navigation pane, select Active Defense > Deception.

    3. Click the Decoy Network tab.

    4. Click Create.

    5. In the dialog box that opens, configure decoy network parameters, and then click OK.

      Table-2 Decoy network configuration items

      Item

      Description

      IPv4 address/mask

      IPv4 address and mask of the decoy network.

      The IPv4 address cannot be 0.0.0.0 or 255.255.255.255.

      VRF

      VPN instance to which the decoy network segment belongs. By default, the value is Public network, which means the decoy network segment belongs to the public network.

  3. Create a detection network

    1. Click the Policies tab.

    2. In the navigation pane, select Active Defense > Deception.

    3. Click the Detection Network tab.

    4. Click Create.

    5. In the dialog box that opens, configure detection network parameters, and then click OK.

      Table-3 Detection network configuration items

      Item

      Description

      IPv4 address/mask

      IPv4 address and mask of the detection network.

      The IPv4 address cannot be 0.0.0.0 or 255.255.255.255.

      VRF

      VPN instance to which the detection network segment belongs. By default, the value is Public network, which means the detection network segment belongs to the public network.

  4. Configure the deception function

    1. Click the Policies tab.

    2. In the navigation pane, select Active Defense > Deception.

    3. Configure deception parameters, and then click OK.

      Table-4 Deception configuration items

      Item

      Description

      Deception

      Enable the deception function

      Decoy server settings

      Trapping and drainage mode

      TCP proxy: The deception device uses the TCP proxy mode to direct suspicious traffic to the decoy server.

      UDP tunneling: The deception device uses a UDP tunnel to direct suspicious traffic to the decoy server.

      Decoy server IP

      IP address of the decoy server.

      The address cannot be 0.0.0.0 or 255.255.255.255.

      Decoy server VRF

      VPN to which the decoy server belongs. By default, this field uses Public network, which means that the decoy server does not belong to a VPN.

      Destination port

      Port number of the decoy server.

      Source address

      IP address or interface used by the device to connect the decoy server.

      The address cannot be 0.0.0.0 or 255.255.255.255.

      Source port

      Source port used to send traffic to the decoy server when the trapping and drainage mode is UDP tunneling.

      VRF

      VPN instance to which the decoy server belongs. By default, the value is Public network, which means the decoy server belongs to the public network.

      Deception settings

      Strict mode

      Enable the strict mode for deception.

      • In strict mode, once the device detects that an attacker sends an ARP request for an offline IP address on a detection network, it immediately decoys the attacker's subsequent traffic destined for the IP address to the decoy server for in-depth analysis.

      • In non-strict mode, the device periodically detects the rate of ARP messages sent by attackers to a detection network. When the rate reaches the ARP scan defense threshold, the subsequent traffic sent from the attackers to the offline IP addresses in the detection network will be lured to the decoy server for further analysis.

      Online IP scanning rate

      Rate at which the device scans the IP addresses in the detection networks.

      The device periodically scans the IP addresses in the detection networks to detect the online status of the addresses.

      ARP scan defense threshold

      ARP sending rate threshold that triggers the deception function.

      This threshold applies only to non-strict mode of deception.