Forum Discussion
F5 DOS problem.
Hi guys,
Just want to ask why F5 mitigate and log DDOS attack even if I dont have any DOS and Log profile on my Virtual Servers.
Thank you.
Regards
4 Replies
- Renato
Altostratus
Aren't you talking about syn-cookie protection? Check if this document sounds familiar to you: SOL14779: Overview of BIG-IP SYN cookie protection (11.3.x - 11.6.x).
Here is a good SOL that covers DDOS and the BIG-IP, SYN floods are just one type of DDOS attack the BIG-IP can help mitigate. [https://support.f5.com/kb/en-us/solutions/public/14000/800/sol14813.html](SOL14813: Detecting and mitigating DoS/DDoS attacks (11.4.x - 12.x))
If you have one of the bigger appliances, like the the 5000 series, they come with hardware syn cookie protection. You can enable syn-cookie-status on a per virtual server basis, disabled by default, but enabled by default with some profiles like TCP & FastL4 for "hardware" syn flood protection. Also enabled on Self-IPs. It's worth noting you need auto last hop enabled for hardware syn cookie protection to work.
From tmsh:
root@(BIG-IP-VE-1)(cfg-sync Standalone)(ModuleNotLicensed:Active)(/Common)(tmos) list ltm virtual test_443 syn-cookie-status
ltm virtual test_443 { syn-cookie-status not-activated }
You can also look in /var/log/ltm for syn cookie threshold messages. Take your time and read the article, there is a lot of good "starting" information in it. Out of the box f5s BIG-IP has an arsenal of DDOS protection, it doesn't stop at SYN floods. Here is a quick list from the SOL of DDOS attacks and how big-ip mitigates them:
Attack------- Mitigation
SYN flood -- SYN cookie protection
ICMP flood -- Maximum reject rate
Peer-to-peer --The BIG-IP system is a port-deny device, and prevents many common exploits by not passing the attack through to the server.
IP fragmentation -- The BIG-IP system drops IP fragments that fail to meet a certain threshold, unless the fragment is the last in a communication.
Slowloris -- iRules can filter out well-known attacks.
UDP flood -- UDP idle session timeout
Ping of death -- The BIG-IP system is hardened to resist this attack. If the attack is against a virtual server with the Any IP feature enabled, then these packets are sent on to the server.
Land --The BIG-IP system is hardened to resist this attack, and does not send this type of packet to the server.
Teardrop -- The BIG-IP system correctly checks frame alignment and discards improperly aligned fragments to process these attacks.
Data attack -- The BIG-IP system is a port-deny device, and prevents many common exploits by not passing the attack through to the server.
Nuke --The BIG-IP system denies ports unless they are specifically enabled.
Sub 7 -- The BIG-IP system denies high ports unless they are specifically enabled.
- Nathaneil_Balag
Nimbostratus
Hi everyone,
Thank you for all your suggestion. I am still testing it on my VM LAB.
Regards
- if you feel one of the answers was good please flag it as an answer to your question.
Help guide the future of your DevCentral Community!
What tools do you use to collaborate? (1min - anonymous)Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com