Hi Roland, Thanks for the reply.
We had problems using the Cisco Detector/Guard solution against a highly random source SYN Flood. If my memory serves me correctly, these were the problems we ran into (you may have to help me out here!): 1) The Detector itself cannot classify incoming SYN packets as bad, as it only sees each random source IP once. It was up to the administrator to take note there was a DDOS attack going on, get out of bed, turn on the Guard, then stay up all night so he could turn it off once the attack subsided. The Arbor solution was suggested as this offered some automation features, but our customer laughed at us when we told her how much it would be. This immediately throws Cisco Guard out of the small/medium sized ISPs due to cost. 2) Once the Cisco Guard is in action, then for every SYN it receives, it doubles the bandwidth in use by sending a SYN/ACK back. This meant the customer would had to invest in twice the amount of burtsable bandwidth to counter the maximum size of SYN Flood. As the ISP could only provide 1Gb, then this meant that using the Cisco Guard in theory could only deal with a 500Mb SYN Flood, unless investments upstream were made in 10Gb infrastructure (for example, so that a 750Mb SYN Flood could have 750Mb worth of SYN/ACKs sent back to each source). Again, not ideal for a small ISP that only has a couple of Gig handoffs. 3) We saw a performance hit on the Cisco Guard when under a large random source SYN Flood. This had a knock-on effect on the customer's latency. Latency is not ideal for certain applications. It may be OK for HTTP/SMTP, but online poker sites and indexes cannot afford to take this hit. That's why it wasn't suitable for our customer's gaming customer - they wanted a solution that would prevent DDOS from causing ANY performance or service degradation whatsoever, and preferably be 100% automated, always on, with minimal maintenance. Oh, and cheap... after all, it's always worth considering whether or not your should just stump up the cash for the exortion demands, rather than invest £££s in new equipment. In the end, after a lot of hard work and late nights pushing the Cisco Guard solution, another reseller stepped in and sold them Toplayer. This immediately addressed the DDOS Attack and concerns about latency (ASIC based), and as it was always on, the customer didn't have to worry about getting out of bed in the middle of the night. The customer could also keep their 1Gb infrastructure, as the Toplayer didn't send back SYN/ACKs after a certain point (using some sort of DDOS Protection algorithm). It was a pity we'd never heard of them before, otherwise it looked like just the right fit. Don't get me wrong - I think Cisco/Arbor have great potential in the large carrier-class space where they have 24/7 support and can afford the additional bandwidth and extra equipment, but cost- and efficiency-wise, it just doesn't scale down (even to fit round a 1Gb pipe!) and I really wouldn't recommend anyone short of a $250,000 budget should start looking at this. Regards, Matt --- Roland Dobbins <[EMAIL PROTECTED]> wrote: > > Actually, FinAckSyn; the Guard doesn't work that > way. Traffic headed > into zones under protection is routed into the Guard > itself, and then > various forms of antispoofing and anomaly-detection > are performed to > determine whether or not the traffic is valid. > Invalid traffic is > dropped by the Guard, while valid traffic is > re-injected into the > network in order to continue towards its > destination. > > The Guard is usually configured as an on-demand > device; it's only > 'inline' when needed, the rest of the time, traffic > follows its > normal course through the network. This type of > operation ensures > that the Guard is only examining traffic when such > examination is > required, and also doesn't require the network to be > re-engineered in > order to induce artificial symmetry. > > In the case of your SP using the Guard to protect > your gaming > servers, it sounds to me as if some baselining is > needed in order to > fine-tune the Guard's profiles of what constitute > normal and valid > traffic to your gaming servers. > > For more information on the Guard, NetFlow, and > Arbor, see this URL: > > http://www.cisco.com/go/cleanpipes > > > On Nov 24, 2005, at 10:58 AM, FinAckSyn wrote: > > > Hi Joel, > > > > Cisco Guard doesn't actually 'stop' SYN packets - > it > > tells routers where the bad traffic is coming > from, > > and gets the routers to block by blackholing the > > route. > > So yes, may look great in a lab environment where > your > > Cisco 7200s are happily throwing SYN packets into > > oblivion, but in the real world, both the SYN > Cookie > > mechanism and routing manipulations cause a lot of > > problems with real world traffic. > > This is where an inline device is so important - > > something that can understand both ends of the > > connection and work out whether it's valid or not > > before throwing it away. > > Our ISP uses Cisco Guard, but we tell them to turn > it > > off, unless absolutely necessary to protect their > own > > peering points, as if it's left on always, it > throws > > our customer's customers out of their online > gaming > > sessions (which is bad news for them and us!). > > > > Regards, > > > > Matt > > > > --- Joel Friedman <[EMAIL PROTECTED]> wrote: > > > >> Riverhead (now Cisco Guard) is by far the best > >> choice. We had a little in > >> house shoot-out where we attacked multiple > vendors' > >> hardware and graphed > >> their results into the millions of packets per > >> second. Due to NDA's we are > >> not allowed to disclose which vendors, nor their > >> results, but I can say that > >> Riverhead successfully defended against more than > >> twice the load of its > >> competitors...at the time it was able to stop > >> approximately 1.5 million SYN > >> packets per second while still allowing > legitimate > >> traffic. > >> > >> IMHO there is no other choice. > >> > >> --Joel > >> > >> > >> -----Original Message----- > >> From: Kyle Quest > >> [mailto:[EMAIL PROTECTED] > >> Sent: Wednesday, November 23, 2005 2:42 PM > >> To: [email protected] > >> Subject: RE: Denial of Service: Commercial > Defense > >> products > >> > >> You should really look at Top Layer if you are > >> serious > >> about defending against denial of service > attacks. > >> Don't even waste your time on Mazu or McAfee. > >> Tipping Point is suppose to get better at it > >> as well (they were working on some news things > >> the last time I had a chance to talk to one > >> of their top guys), but I don't know if it's > >> already available. > >> > >> I would recommend looking at the NSS reports > >> (http://www.nss.co.uk/download/download.htm). > >> Unfortunately, the online version of the report > >> that includes Top Layer review is no longer > >> available, > >> but you can still buy it for a couple of bucks. > >> > >> Kyle > >> > >> -----Original Message----- > >> From: Ogle [mailto:[EMAIL PROTECTED] > >> Sent: Tuesday, November 22, 2005 4:44 AM > >> To: [email protected] > >> Subject: Denial of Service: Commercial Defense > >> products > >> > >> > >> Hi, > >> I have an ISP customer who want to protect their > >> network and their > >> subscriber's network. > >> In "Internet Denial of Service: Attack and > Defense > >> Mecahnisms" book, I > >> noticed 7 commercial products. > >> 1. Mazu Enforcer by Mazu Networks > >> 2. Peakflow by Arbor Networks > >> 3. WS Series Apliances by Webscreen Technologies > >> 4. Captus IPS by Captus Networks > >> 5. MANAnet Shield by CS3 > >> 6. Cisco Traffic Anomaly Detector XT and Cisco > Guard > >> XT > >> 7. StealthWatch by Lancope > >> > >> Since I'm new with this type of products, is > there > >> any reference out > >> there to help me choose the right solution to my > >> customer ? > >> Is there any problem if I use IPS (ie: > TippingPoint, > >> McAfee) for this > >> solution ? > >> > >> Thanks. > >> > > > > > > > > > > > ___________________________________________________________ > > WIN ONE OF THREE YAHOO! VESPAS - Enter now! - > http:// > > uk.cars.yahoo.com/features/competitions/vespa.html > > > > > ---------------------------------------------------------------------- > > > -- > > Test Your IDS > > > > Is your IDS deployed correctly? > > Find out quickly and easily by testing it > > with real-world attacks from CORE IMPACT. > > Go to > http://www.securityfocus.com/sponsor/CoreSecurity_focus- > > > ids_040708 > > to learn more. > > > ---------------------------------------------------------------------- > > > -- > > -------------------------------------------------------------------- > Roland Dobbins <[EMAIL PROTECTED]> // 408.527.6376 > voice > > Algorithm agility is an essential feature in any > Internet protocol. > === message truncated === ___________________________________________________________ Yahoo! Model Search 2005 - Find the next catwalk superstars - http://uk.news.yahoo.com/hot/model-search/ ------------------------------------------------------------------------ Test Your IDS Is your IDS deployed correctly? Find out quickly and easily by testing it with real-world attacks from CORE IMPACT. Go to http://www.securityfocus.com/sponsor/CoreSecurity_focus-ids_040708 to learn more. ------------------------------------------------------------------------
