User manual
7-35
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2
OL-29168-01
Chapter 7 Defining Signatures
Configuring Signatures
1330 7 TCP Drop - Bad WinScale Option
Value
Fires when a TCP packet has a
bad window scale value.
Modify Packet Inline
sets the value to the
closest constraint
value.
Modify Packet Inline
1330 8 TCP Drop - SACK Allow Without
SYN
Fires when the TCP SACK
allowed option is seen in a
packet without the SYN flags
set.
Modify Packet Inline
clears the SACK
allowed option.
Modify Packet Inline
1330 9 TCP Drop - Data in SYN|ACK Fires when TCP packet with
SYN and ACK flags set also
contains data.
— Deny Packet Inline
1330 10 TCP Drop - Data Past FIN Fires when TCP data is
sequenced after FIN.
— Deny Packet Inline
1330 11 TCP Drop - Timestamp not
Allowed
Fires when TCP packet has
timestamp option when
timestamp option is not
allowed.
— Deny Packet Inline
1330 12 TCP Drop - Segment Out of Order Fires when TCP segment is out
of order and cannot be queued.
— Deny Packet Inline
1330 13 TCP Drop - Invalid TCP Packet Fires when TCP packet has
invalid header.
— Deny Packet Inline
1330 14 TCP Drop - RST or SYN in
window
Fires when TCP packet with
RST or SYN flag was sent in
the sequence window but was
not the next sequence.
— Deny Packet Inline
1330 15 TCP Drop - Segment Already
ACKed
Fires when TCP packet
sequence is already ACKed by
peer (excluding keepalives).
— Deny Packet Inline
1330 16 TCP Drop - PAWS Failed Fires when TCP packet fails
PAWS check.
— Deny Packet Inline
1330 17 TCP Drop - Segment out of State
Order
Fires when TCP packet is not
proper for the TCP session
state.
— Deny Packet Inline
1330 18 TCP Drop - Segment out of
Window
Fires when TCP packet
sequence number is outside of
allowed window.
— Deny Packet Inline
3050 Half Open SYN Attack syn-flood-max-embry
onic 5000
3250 TCP Hijack max-old-ack 200
3251 TCP Hijack Simplex Mode max-old-ack 100
1. The timer is reset to 0 after each packet on the TCP session. by default, this signature does not produce an alert. You can choose to produce alerts for
expiring TCP connections if desired. A statistic of total number of expired flows is updated any time a flow expires.
Table 7-6 TCP Stream Reassembly Signatures (continued)
Signature ID and Name Description
Parameter With
Default Value and
Range Default Actions