Web Management Guide-R04

Table Of Contents
Chapter 12
| Security Measures
DHCPv4 Snooping
– 368 –
TCP-SYN/FIN Scan – A TCP SYN/FIN scan message is used to identify listening
TCP ports. The scan uses a series of strangely configured TCP packets which
contain SYN (synchronize) and FIN (finish) flags. If the target's TCP port is
closed, the target replies with a TCP RST (reset) packet. If the target TCP port is
open, it simply discards the TCP SYN FIN scan. (Default:
Disabled)
TCP Xmas Scan – A so-called TCP XMAS scan message is used to identify
listening TCP ports. This scan uses a series of strangely configured TCP packets
which contain a sequence number of 0 and the URG, PSH and FIN flags. If the
target's TCP port is closed, the target replies with a TCP RST packet. If the target
TCP port is open, it simply discards the TCP XMAS scan. (Default:
Disabled)
Web Interface
To protect against DoS attacks:
1. Click Security, DoS Protection.
2. Enable protection for specific DoS attacks.
3. Click Apply
Figure 229: Protecting Against DoS Attacks
DHCPv4 Snooping
The addresses assigned to DHCPv4 clients on insecure ports can be carefully
controlled using the dynamic bindings registered with DHCPv4 Snooping (or using
the static bindings configured with IPv4 Source Guard). DHCPv4 snooping allows a
switch to protect a network from rogue DHCPv4 servers or other devices which
send port-related information to a DHCPv4 server. This information can be useful in
tracking an IPv4 address back to a physical port.
Command Usage
DHCP Snooping Process
Network traffic may be disrupted when malicious DHCP messages are received
from an outside source. DHCP snooping is used to filter DHCP messages
received on a non-secure interface from outside the network or fire wall. When
DHCP snooping is enabled globally and enabled on a VLAN interface, DHCP