Goal: Prevent a host on your network that is scanning a TCP port on

advertisement
Lab 7: Preventing DoS from Scanning Hosts
Answers
Goal: Prevent a host on your network that is scanning a TCP port on
all IP numbers from creating (S,G) state in your routers and causing
your network to advertise an excessive number of multicast sources
via MSDP.
- Before you start, note the (S,G) state in your RP router and the number of sources it
is advertising to its peers.
show ip mroute summary
show ip msdp peer 206.244.x.z advertised
- Start Wireshark on Host-Q or Host-R, and on the same host run the script “lab7.ssm”.
sudo lab7.ssm
- Watch the output packets on Wireshark. When the script has completed, look at the
summary of the (S,G) state on your RP and the number of sources it is advertising to
its peers.
- Now run the script “lab7.asm”.
sudo lab7.asm
- Again watch the output packets on Wireshark. When the script has completed,
look at the summary of the (S,G) state on your RP and the number of sources it is
advertising to its peers. You may also log into your neighboring pod’s RP and look at
the MSDP state created by a scanning host on your network.
- Note the difference between scanning the SSM range and an ASM range.
- Now create an extended IP access list that only allows UDP traffic when the
destination address is within the multicast address range.
ip access-list extended multicast-sanity
remark Multicast should only be udp
remark Block TCP and ICMP scans of multicast address space
deny
tcp any 224.0.0.0 15.255.255.255 log
deny
icmp any 224.0.0.0 15.255.255.255 log
permit ip any any
- Apply the inbound IP access list to the interfaces on your Customer-D and
Customer-E routers that Host-Q, Host-R and the switch are attached to.
int eth x
ip access-group multicast-sanity in
- If the (S,G) state created earlier has not yet timed out on your RP, then clear it.
clear ip mroute *
clear ip msdp sa-cache 206.244.x.q/r
- Run the scripts again and see if the IP access list blocks the (S,G) state from being
created and MSDP advertisements from being sent.
- Extra credit - Modify your access list if needed to allow PIM traffic and OSPF etc. And
also allow ICMP traffic on group 224.0.0.1 (See RFC 1256).
ip access-list extended multicast-sanity
remark 224.0.0.x never creates state, it is link-local only
permit ip any 224.0.0.0 0.0.0.255
remark Multicast should only be udp
remark Block TCP and ICMP scans of multicast address space
deny
tcp any 224.0.0.0 15.255.255.255 log
deny
icmp any 224.0.0.0 15.255.255.255 log
remark never multicast source address
deny
ip 224.0.0.0 15.255.255.255 any log
permit ip any any
Download