ASA TCP Intercept

  • Post author:
  • Post category:ASA / Cisco

An attacker can launch a DOS attack by flooding a host with thousands of TCP SYN packets, the source address would be spoofed with no way for the host server to respond, this would create half-open TCP connections on the host consuming resources until the host is overwhelmed and packets are dropped.

With the Cisco ASA firewall you can configure the Modular Policy Framework (MPF) to restrict the number of TCP half-open connections (embryonic-conn-max). When enabled, the MPF policy will intercept the tcp SYN and only forward the connection once the 3-way handshake is complete.

This blog post describes the steps use in order to limit half-open connections and to demonstrate this in action using hping3 tool, to simulate an attack.

Define Access Control List

access-list INTCPT_SVR01 permit tcp any host 192.168.10.5 eq 80

Create Class Map

class-map CM_INTCPT_SVR01
 match access-list INTCPT_SVR01

Create Policy Map

policy-map PM_INTCPT_SVR01
 class CM_INTCPT_SVR01
  set connection embryonic-conn-max 40

Assign to Service Policy

service-policy PM_INTCPT_SVR01 interface OUTSIDE

Verification

Using hping3 (available to download via linux) send an attack to the target host machine (in this instance 1.1.1.10 on port 8080, which is natted to the real IP address 192.168.10.5 on port 80).  Use the variable “–rand-source” to simulate multiple individual connection attempts, these source addresses in the lab will be spoofed.

On the ASA run the command show service-policy interface OUTSIDE you can determine the number of embryonic connections.

If logging is enabled on the ASA you should be able to see the following