rssLink RSS for all categories
 
icon_red
icon_green
icon_red
icon_red
icon_blue
icon_green
icon_green
icon_red
icon_red
icon_red
icon_orange
icon_green
icon_green
icon_green
icon_green
icon_blue
icon_green
icon_orange
icon_red
icon_green
icon_red
icon_red
icon_green
icon_red
icon_red
icon_red
icon_red
icon_orange
icon_green
 

FS#5221 — FS#9145 — TCP/SYN port 53

Attached to Project— Anti-DDoS
Modernization
Paris DC1
CLOSED
100%
The Arbor TMS boxes manage port 53 via a
DNS AUTH specific protection. The base
configuration forces the TCP/SYN
protection to ignore port 53.

This causes some problems when
port TCP/53 is attacked.

We have set up a customised
configuration which enables TCP/53
packet filtration on the TCP AUTH
but not on the DNS AUTH.

# services tms registry main clear mitigation.tcp_syn.ignore_dst_ports
Registry key 'mitigation.tcp_syn.ignore_dst_ports' successfully cleared.

Date:  Tuesday, 13 August 2013, 16:11PM
Reason for closing:  Done