Fw: tcp intercept

From: yijibin (yijibin@xxxxxxxxxxxxxxxx)
Date: Wed May 22 2002 - 22:40:45 GMT-3


   
??? yijibin
ChoiceWay Technologies Co.,Ltd
http://www.choiceway.com.cn
Tele:010-62385177-1707 Fax:010-62385159
Mobile:13910137921
E-mail:yijibin@choiceway.com.cn

----- Original Message -----
From: "yijibin" <yijibin@choiceway.com.cn>
To: "CCIE-Maillist" <CCIE-Maillist@foxgal.com>
Sent: Thursday, May 23, 2002 9:34 AM
Subject: Re: tcp intercept

> Set the tcp intercept mode to watch mode ,and set the watch-timeout to 3 minu
tes. So when you under the SYN attack, the router will down the watch-time to h
alf . So you get the 1.5 minutes.
>
> ip tcp intercept mode watch
> ip tcp intercept watch-timeout 180
>
>
>
> good luck!
>
> yijibin
>
> ----- Original Message -----
> From: "CCIE-Maillist" <CCIE-Maillist@foxgal.com>
> To: <ccielab@groupstudy.com>
> Sent: Wednesday, May 22, 2002 10:09 PM
> Subject: tcp intercept
>
>
> > I am trying to configure tcp intercept but don't have any practical experie
nce
> > with it. If a lab says that you are getting a lot of rogue packets and to
> > configure it such that hosts can get through every one and a half minutes,
no
> > matter how many rogue packets you are getting- which setting do you set for
> > the 1.5 minutes?
> >
> > I am looking on the webpage-
> > http://www.cisco.com/univercd/cc/td/doc/product/software/ios122/122cgcr/fse
cu
> > r_c/ftrafwl/scfdenl.htm
> >
> > My guess is to set the watch timeout but can someone who has experience
> > confirm whether or not that is correct?
> >
> > Thanks,
> > David



This archive was generated by hypermail 2.1.4 : Thu Jun 13 2002 - 10:59:05 GMT-3