F5BigDdosGlobal CRD¶
The list of parameters to configure F5BigDdosGlobal CRD.
hslPublisher¶
Parameter | Description |
---|---|
hslPublisher | Specifies the endpoint logging server to send logging messages. |
allowList¶
Parameter | Description | Default |
---|---|---|
srcAddressList string |
Specifies the list of source IP addresses excluded from DDoS detection/mitigation. Refers to the AddressList CR. Note: The address must not include prefixes other than 32(IPv4) and 128 (IPv6). |
|
ipProtocol string |
Specifies the IP protocol allowed by the allowList. Available options: any, icmp, igmp, tcp, udp. |
any |
entryType string |
Specifies the category to match addresses. Available options: dst-match, src-match, v4-all, v6-all, or all-ip. |
|
matchingAddress string |
Specifies the criteria to match address for entryType. Note: You can configure src-match or dst-match option to match address. The -all* option is used to consider all the entryType**. |
any |
dstPort integer |
Specifies the destination port. Note: You can configure only for "tcp" or "udp" ip protocols. The minimum and maximum value are 0 and 65535, respectively. |
0 |
srcVlan string |
Specifies the name of the source VLAN. | any |
Back reference to Gateway Class object for Gateway API¶
This table lists all the targetRef parameters for object
types:
Parameter | Description | Default |
---|---|---|
targetRef.group string |
Specifies the API group to which the referenced target resource belongs. The maximum length is 255 and supports "^[0-9a-zA-Z._-]+$" pattern. |
gateway.networking.k8s.io |
targetRef.name string |
Specifies the name of the Kubernetes resource for the GatewayClass. The maximum length is 255 and supports "^[0-9a-zA-Z._-]+$" pattern. Note: This is a required field. |
|
targetRef.kind string |
Specifies the kind for target resource. | enum: [GatewayClass] |
DoS tuneable parameters¶
This table lists all the dosGlobalOption
parameters for object
types:
Parameter | Description | Default |
---|---|---|
dosGlobalOption object |
Specifies CRD fields for configuring global DDoS options. | {} |
dosGlobalOption.common object |
Specifies CRD fields for common dos sys db variables. | {} |
dosGlobalOption.common.forceSwDos boolean |
Force SW DoS and not to use HW offload for DoS on HW capable systems. | false |
vectors¶
IPv4 Flood Vectors¶
This table lists all the IPv4 Flood Vectors parameters for object
types:
Parameter | Description | Support for Hardware Acceleration |
---|---|---|
vectors.ipv4IcmpFlood |
This vector detects or rate-limits IPv4 ICMP flood attacks based on the state and rate-limit configuration. It also supports per-source and per-destination IP detection for bad actor and bad-destination mitigation and detection. | Yes |
vectors.tidcmp |
This vector detects ICMP Source Quench attacks. It is detected or dropped based on the state and rate limit configuration; provides detection and rate limiting per-sourceIP and per-destinationIP, and is subject to ba/bd ICMP source quench packets. | Yes |
vectors.ipv4FrafFlood |
This vector detects the attack when spoofed IPv4 fragments are sent at a very high rate. Detected or dropped based on the state and rate limit configuration, it provides per-sourceIP and per-destinationIP detection and rate limiting. | No |
vectors.ipv4OverlapFrag |
This vector detects attacks when a flood of IPv4 overlapping fragments is received. Detected or ratelimited based on the state and rate limit configuration, it offers per-sourceIP and per-destinationIP detection and rate limiting. | No |
vectors.ipv4LowTtl |
This vector detects the attack when IPv4 packets with low TTL (non zero) values are received. Detection or rate limit is done based on the state and rate limit configuration. It provides per-sourceIP and per-destinationIP detection and rate limiting. This vector is subject to ba/bd. | Yes |
vectors.ipv4NoPayload |
This vector detects the attack with no Layer 4 payload for the IPv4 address. Based on the state and rate-limit configuration, it is detected or ratelimited. Also offers per-sourceIP and per-destinationIP detection and rate limiting. This vector is categorized as ba/bd. | Yes |
vectors.ipv4OptFrame |
This vector detects attack when a flood of too many IPv4 packets with an IP options frame are received. Attack is detected or dropped per the state and rate limit configuration and provides per-sourceIP and per-destinationIP detection and rate limiting. | No |
This table lists all the parameters common for IPv4 Flood vectors.
Parameter | Description | Default |
---|---|---|
type | Specifies the type of DoS Flood Vector to detect and mitigate: udp-flood, ether-brdcst-pkt, ether-multicst-pkt, arp-flood, ip-frag-flood, ipv6-frag-flood, tcp-rst-flood, icmpv4-flood, icmpv6-flood, and tcp-psh-flood. | |
state string |
Specifies the system’s response when a vector match occurs: detection-only or mitigation. Note: To disable, delete the custom resource. |
detection-only |
detectionThresholdEps Integer |
Specifies the attack detection threshold in Events Per Second (EPS). When EPS exceeds the threshold, the attack is logged and reported. Note: The minimum and maximum values are 0 and 4294967295, respectively. |
4294967295 |
detectionThresholdPercentage integer |
Specifies the attack detection threshold by Events Per Second (EPS) percentage increase. The system compares the current EPS rate to the average rate from the last hour, and when the percentage is exceeded, the attack is logged and reported. Note: The minimum and maximum values are 0 and 4294967295, respectively. |
4294967295 |
rateLimit integer |
Specifies the rate limit in Events Per Second (EPS). When EPS exceeds the threshold, excess events are dropped until the EPS rate does not longer exceed the threshold. Note: The minimum and maximum values are 0 and 4294967295, respectively. |
4294967295 |
perSrcIpDetectionEps integer |
Specifies the attack detection threshold in EPS per source IP address. Note: The minimum and maximum values are 0 and 4294967295, respectively. |
4294967295 |
perSrcIpLimitEps integer |
Specifies the rate limit in EPS for the configured attack type per source IP. Note: The minimum and maximum values are 0 and 4294967295, respectively. |
4294967295 |
perDstIpDetectionEps integer |
Specifies the attack detection threshold in EPS for the configured attack type per destination IP. Note: The minimum and maximum values are 0 and 4294967295, respectively. |
4294967295 |
perDstIpLimitEps integer |
Specifies the rate Limit in EPS for the configured attack type per destination IP. Note: The minimum and maximum values are 0 and 4294967295, respectively. |
4294967295 |
IPv4 Error Vectors¶
This table lists all the Error parameters for object
types:
Parameter | Description | Support for Hardware Acceleration |
---|---|---|
vectors.ipv4BadTtl |
This vector occurs when the time-to-live value is zero for an IPv4 packet. When enabled, an attack is detected and dropped based on the threshold configuration. | Yes |
vectors.ipv4BadVer |
This vector detects the attack when the IP version in the header is not set to 4. When enabled, attack is detected and dropped based on the threshold configuration. | Yes |
vectors.ipv4BadScr |
This vector detects the attack when the source IP is either broadcast or multicast. When enabled, an attack is detected and dropped based on the threshold configuration. | Yes |
vectors.ipv4ErrorChecksum |
This vector detects the attack when an incorrect IPv4 header checksum is observed. When enabled, attack is detected and dropped based on the threshold configuration. | Yes |
vectors.ipv4FragError |
This vector detects attacks with invalid IPv4 fragmentation offset values. When enabled, attack is detected and dropped based on the threshold configuration. | Yes |
vectors.ShortFrag |
This vector detects attacks with too small IPv4 fragment packets. When enabled, an attack is detected and dropped based on the threshold configuration. | No |
vectors.ipv4HdrLenTooShort |
This vector detects attacks with header lengths less than 20 bytes. When enabled, an attack is detected and dropped based on the threshold configuration. | No |
vectors.ipv4HdrLenGtLLen |
This vector detects the attack traffic with no room in the Layer 2 packet for the IPv4 IP header (including options). When enabled, Attack is detected and dropped based on the threshold configuration. | No |
vectors.ipv4OptIllegalLen |
The vector detects the attcack traffic with illegal length in the IP option. When enabled, Attack is detected and dropped based on the threshold configuration. | No |
vectors.ipv4LenGtL2Len |
This vector detects the attack traffic with the total length in the IPv4 header exceeding the Layer 3 length in a Layer 2 packet. When enabled, Attack is detected and dropped based on the threshold configuration. | No |
This table lists all the parameters common for IPv4 error vectors.
Parameter | Description | Default |
---|---|---|
detectionThresholdEps integer |
Specifies the IPv6 attack detection threshold in EPS for the configured attack type. | 4294967295 |
detectionThresholdPercentage integer |
Specifies the IPv6 attack detection percentage increase for the configured attack type. | 4294967295 |
IPv6 Flood Vectors¶
This table lists all the Flood parameters for object
types:
Parameter | Description | Support for Hardware Acceleration |
---|---|---|
vectors.ipv6L4ExtHdrsGoEnd |
This vector detects attacks with extended headers reaching or surpassing the end of the Layer 4 frame. Based on the state and rate limit configuration, an attack is detected or dropped and provides per-sourceIP and per-destinationIP detection and rate limiting. | Yes |
vectors.ipv6BadExtHdrOrder |
This vector detects attacks with out of ordered extended headers in the IPv6 header. Attack is detected or dropped as per the state and rate limit configuration. | No |
vectors.ipv6IcmpFlood |
This vector detects the IPv6 ICMP flood attack. Attack is detected or rate-limited based on the state and rate limit configuration. Also provides both per-sourceIP and per-destinationIP detection and rate limiting. | No |
vectors.ipv6FragFlood |
This vector detects the attack when spoofed IPv6 fragments are received at a very high rate. Attack is detected or ratelimited based on the state and rate-limit configuration. Also provides both per-sourceIP and per-destinationIP detection and rate-limiting. | Yes |
vectors.ipv6AtomicFrag |
This vector detects attacks with IPv6 fragment headers with M=0 and FragOffset=0. Attack is detected or ratelimited based on the state and rate-limit configuration. Also provides both per-sourceIP and per-destinationIP detection and rate-limiting. | No |
vectors.ipv4MappedIpv6Addr |
This vector detects attacks with an IPv4 address occupying the lowest 32 bits of an IPv6 address. Attack is detected or ratelimited based on the state and rate-limit configuration. | No |
vectors.ipv6RoutingHdrType0 |
This vector detects the attack when IPv6 packets with routing header type zero are received. Attack is detected or ratelimited based on the state and rate-limit configuration. Also provides both per-sourceIP and per-destinationIP detection and rate limiting. | No |
vectors.ipv6LowHopCount |
This vector detects the attack when IPv6 extended header hop count is set to less than or equal to the configured value of ipv6LowHopCount. Attack is detected or dropped according to the state and rate limit configuration. Also provides both per-sourceIP and per-destinationIP detection and rate limiting. | Yes |
vectors.ipv6ExtHdrTooLarge |
This vector detects the attack when we receive packets which have too Large IPv6 Extension Header field based on the configured limit. Attack is detected or ratelimited based on the state and rate-limit configuration. Also provides both per-sourceIP and per-destinationIP detection and rate-limiting. | No |
vectors.ipv6WithExtHdrFrames |
This vector detects attacks with too many IPv6 Extension Headers exceeding the limit configured. Attack is detected or dropped according to the state and rate limit configuration. Also provides both per-sourceIP and per-destinationIP detection and rate limiting. | No |
vectors.ipv6TooManyExtHdrs |
This vector detects attacks with too many IPv6 Extension Headers exceeding the limit configured. Attack is detected or dropped according to the state and rate limit configuration. Also provides both per-sourceIP and per-destinationIP detection and rate limiting. | No |
This table lists all the common config parameters common for IPv6 Flood vectors.
Parameter | Description | Default |
---|---|---|
vectorType | Specifies the type of IPv6 DoS Flood Vector to match: l4-ext-hdrs-go-end, and bad-ext-hdr-order. | |
state string |
Specifies the response for an IPv6 vector match: detection-only or mitigation. Note: To disable, delete the custom resource. |
detection-only |
detectionThresholdEps integer |
Specifies the IPv6 attack detection threshold in EPS for the configured attack type. Note: The minimum and maximum values are 0 and 4294967295, respectively. |
4294967295 |
detectionThresholdPercentage integer |
Specifies the IPv6 attack detection percentage increase for the configured attack type. Note: The minimum and maximum values are 0 and 4294967295, respectively. |
4294967295 |
rateLimit integer |
Specifies the rate limit in EPS for the configured IPv6 attack type. | 4294967295 |
perSrcIpDetectionEps integer |
Specifies the IPv6 attack detection threshold in EPS for the configured attack type per source IP. Note: - The minimum and maximum values are 0 and 4294967295, respectively. - Not applicable to: ipv6BadExtHdrOrder and ipv4MappedIpv6Addr ,: |
4294967295 |
perSrcIpLimitEps integer |
Specifies the rate limit in EPS for the configured IPv6 attack type source IP. Note: - The minimum and maximum values are 0 and 4294967295, respectively. - Not applicable to: ipv6BadExtHdrOrder and ipv4MappedIpv6 |
4294967295 |
perDstIpDetectionEps integer |
Specifies the attack detection threshold in EPS for the configured IPv6 attack type per destination IP. Note: - The minimum and maximum values are 0 and 4294967295, respectively. - Not applicable to: ipv6BadExtHdrOrder and ipv4MappedIpv6 |
4294967295 |
perDstIpLimitEps integer |
Specifies the rate Limit in EPS for the configured IPv6 attack type per destination IP. Note: - The minimum and maximum values are 0 and 4294967295, respectively. - Not applicable to: ipv6BadExtHdrOrder and ipv4MappedIpv6 |
4294967295 |
lowHopCount integer |
Specifies the minimum value for the hop count. Note: - The minimum and maximum values are 1 and 4, respectively. - Applicable only to: ipv6LowHopCount |
1 |
maxIpv6ExtHdrSize integer |
Specifies the extension size. Note: - The minimum and maximum values are 0 and 1024, respectively. - Applicable only to: ipv6LowHopCount |
128 |
ipv6ExtHdrFrameType array |
The enum options are auth, dstopt, esp, frag, hbh, mobility, route, all Note: Applicable only to: ipv6WithExtHdrFrames |
all |
maxIpv6ExtHdrs integer |
The minimum and maximum values are 0 and 15 respectively. Applicable only to: ipv6TooManyExtHdrs |
4 |
IPv6 Error Vectors¶
This table lists all the Error parameters for object
types:
Parameter | Description | Support for Hardware Acceleration |
---|---|---|
vectors.ipv6DupExtHdr |
This vector detects attacks with an extension header appearing more than once in an IPv6 packet, excluding the Destination Options extension header. When enabled, an attack is detected and dropped based on the threshold configuration. | No |
vectors.ipv6BadHopCount |
This vector detects attacks with both the terminated (Count=0) and forwarding packet (Count=1) counts set to invalid. When enabled, an attack is detected and dropped based on the threshold configuration. | Yes |
vectors.ipv6BadVersion |
This vector detects attacks with the version not set to 6, in the IPv6 header. When enabled, an attack is detected and dropped based on the threshold configuration. | No |
vectors.ipv6AddrLenGtL2Len |
This vector detects attacks with the IPv6 address length exceeding the Layer 2 length. When enabled, an attack is detected and dropped based on the threshold configuration. | No |
vectors.ipv6PayloadLenLtL2Len |
This vector detects attacks with the specified IPv6 payload length shorter than the Layer 2 length. When enabled, Attack is detected and dropped based on the threshold configuration. | No |
vectors.ipv6BadAddr |
This vector detects the attack with a multicast source IPv6 address. When enabled, an attack is detected and dropped based on the threshold configuration. | No |
vectors.ipv6FragError |
This vector detects attacks with invalid IPv6 fragmentation offset values. When enabled, an attack is detected and dropped based on the threshold configuration. | Yes |
vectors.ipv6FragOverlapError |
This vector detects attacks when IPv6 overlapping fragments are received. When enabled, an attack is detected and dropped based on the threshold configuration. | No |
vectors.ipv6ShortFragError |
This vector detects attacks with the undersized IPv6 fragment packets. When enabled, an attack is detected and dropped based on the threshold configuration. | No |
This table lists all the parameters common for IPv6 error vectors.
Parameter | Description | Default |
---|---|---|
detectionThresholdEps integer |
Specifies the IPv6 attack detection threshold in EPS for the configured attack type. | 4294967295 |
detectionThresholdPercentage integer |
Specifies the IPv6 attack detection percentage increase for the configured attack type. | 4294967295 |
TCP Flood Vectors¶
This table lists all the TCP Flood parameters for object
types:
Parameter | Description | Support for Hardware Acceleration |
---|---|---|
vectors.tcpRstFlood |
This vector detects the attack with an RST flag set in the TCP packet to tamper with internet communications. It is detected or dropped based on the state and rate limit configuration and provides detection and rate limiting per-sourceIP and per-destinationIP. | Yes |
vectors.tcpFlagsUncommonFlood |
This vector detects attacks with uncommon combinations of flags in the TCP packet to tamper with internet communications. It is detected or dropped based on the state and rate limit configuration and provides detection and rate limiting per-sourceIP and per-destinationIP. Current list of uncommon flag combinations are A00SF [19],AP0S0 [26],AP0SF [27]. | No |
vectors.tcpSynOversize |
This vector detects attack traffic with TCP SYN packets larger than 64 bytes. It is detected or dropped based on the state and rate limit configuration. Provides detection and rate-limiting per-sourceIP and per-destinationIP. | No |
vectors.tcpBadUrg |
This vector detects attack traffic with URG flag set, and the urgent pointer is 0. It is detected or dropped based on the state and rate limit configuration, provides detection and rate limiting per-sourceIP and per-destinationIP. | Yes |
vectors.tcpOptIverrunsTcpHdr |
This vector detects attack traffic with option bits that overrun the TCP header. It is detected or dropped based on the state and rate limit configuration. Provides detection and rate limiting per-sourceIP and per-destinationIP. | No |
vectors.WindowSize |
This vector detects attack traffic with a TCP window size of zero. Attack is detected or ratelimited based on the state and rate-limit configuration. Provides both per-sourceIP and per-destinationIP detection and rate limiting. | No |
vectors.nonTcpConnection |
This attack vector targets all connections that are not TCP. Attack is detected or ratelimited based on the state and rate-limit configuration. Provides both per-sourceIP and per-destinationIP detection and rate-limiting. | No |
vectors.tcpOptIlegalLen |
This vector detects attack traffic with an illegal TCP Option length. Attack is detected or ratelimited based on the state and rate-limit configuration. Provides both per-sourceIP and per-destinationIP detection and rate limiting. | No |
vectors.synAckFlood |
This vector detects the flood of traffic with both TCP SYN and ACK flags set in the packet. Attack is detected or ratelimited based on the state and rate-limit configuration. Provides both per-sourceIP and per-destinationIP detection and rate-limiting. | Yes |
vectors.synFlood |
This vector detects the flood of traffic with TCP SYN flag set. SYN cookie feature can be enabled for mitigation actions. Attack is detected or ratelimited based on the state and rate-limit configuration. Provides both per-sourceIP and per-destinationIP detection and rate limiting. | Yes |
vectors.ackFlood |
This vector detects the flood of traffic with TCP ACK flags set in the packet. Attack is detected or rate-limited based on the state and rate limit configuration. Provides both per-sourceIP and per-destinationIP detection and rate limiting. | Yes |
vectors.TimestampFlood |
This vector detects the flood of traffic with invalid timestamps given for a TCP ACK packet. Attack is detected or ratelimited based on the state and rate-limit configuration. Provides both per-sourceIP and per-destinationIP detection and rate-limiting. | No |
This table lists all the common config parameters common for TCP Flood vectors.
Parameter | Description | Default |
---|---|---|
detectionThresholdEps integer |
Specifies the IPv6 attack detection threshold in EPS for the configured attack type. Note: The minimum and maximum values are 0 and 4294967295, respectively. |
4294967295 |
detectionThresholdPercentage integer |
Specifies the IPv6 attack detection percentage increase for the configured attack type. Note: The minimum and maximum values are 0 and 4294967295, respectively. |
4294967295 |
rateLimit integer |
Specifies the rate limit in EPS for the configured IPv6 attack type. Note: The minimum and maximum values are 0 and 4294967295, respectively. |
4294967295 |
perSrcIpDetectionEps integer |
Specifies the IPv6 attack detection threshold in EPS for the configured attack type per source IP. Note: The minimum and maximum values are 0 and 4294967295, respectively. |
4294967295 |
perSrcIpLimitEps integer |
Specifies the rate limit in EPS for the configured IPv6 attack type source IP. Note: The minimum and maximum values are 0 and 4294967295, respectively. |
4294967295 |
perDstIpDetectionEps integer |
Specifies the attack detection threshold in EPS for the configured IPv6 attack type per destination IP. Note: The minimum and maximum values are 0 and 4294967295, respectively. |
4294967295 |
perDstIpLimitEps integer |
Specifies the rate Limit in EPS for the configured IPv6 attack type per destination IP. Note: The minimum and maximum values are 0 and 4294967295, respectively. |
4294967295 |
onlyUnsolicited boolean |
If set to True, count only the unsolicited SYN-ACKs that are received. If set to False, count all SYN-ACKs received. Note: This parameter is applicable for synAckFlood. |
true |
timestampCookie boolean |
If set to true, the timestamp cookie is enabled on all vlans. Note: This parameter is applicable for askTimestampFlood. |
true |
synCookie object |
When Syn Cookie is enabled, BIGIP sends a cookie in the SynAck response during Syn Flood. TCP flow is only created when the client responds back with the Syn Cookie. In ADoS Mode, valid client entries will be added to verifiedList. Refer to below table for synCookie Parameters Note: This parameter is applicable for synFlood. |
true |
synCookie Parameters
Parameter | Description | Default |
---|---|---|
state string |
Indicates the status of the parameter. Available options: enable or disable | enable |
verifiedList string |
Valid client entries are added to verifiedList which respond to Syn Cookie. Any change to this parameter in ADoS mode does not affect as verifiedList is always enabled. | enable |
threshold integer |
Specifies the threshold value. Note: The minimum and maximum values are 0 and 4294967295, respectively. |
4294967295 |
hwScrubTime integer |
This option specifies the scrub time in units of minutes for flushing the verifiedList entries from HW. This is supported in ADoS mode only. Note: The minimum and maximum values are 1 and 450, respectively. |
120 |
verifiedListSkipDos boolean |
If set to true, DoS vectors TCP SYN/ACK flood and TCP RST flood for IPs in the verifiedList is skipped. If verifiedList is not enabled, this option has no effect. This is supported in ADoS mode only. | true |
TCP Error Vectors¶
This table lists all the TCP Error parameters for object
types:
Parameter | Description |
---|---|
vectors.tcpHdrLenGtL2Len |
This vector detects the attack traffic with TCP header length exceeding the Layer 2 length. When enabled, attack is detected and dropped based on the threshold configuration. |
vectors.tcpHdrLenTooShort |
This vector detects the attack traffic with Data Offset value in the TCP header that is less than 20 bytes. When enabled, attack is detected and dropped based on the threshold configuration. |
vectors.tcpFlagsMalformed |
This vector detects attack traffic with malformed combinations of flags in the TCP header. When enabled, attack is detected and dropped based on the threshold configuration. Current list of malformed flag combinations are 00000 [00],0000F [01],000SF [03],00R0F [05],00RS0 [06], 00RSF [07],0P000 [08],0P00F [09],0P0S0 [10],0P0SF [11], 0PR00 [12],0PR0F [13],0PRS0 [14],0PRSF [15],A0R0F [21], A0RS0 [22],A0RSF [23],APR00 [28],APR0F [29],APRS0 [30], APRSF [31]. |
This table lists all the common config parameters common for TCP Error vectors.
Parameter | Description | Default |
---|---|---|
detectionThresholdEps integer |
Specifies the TCP attack detection threshold in EPS for the configured attack type. Note: The minimum and maximum values are 0 and 4294967295, respectively. |
4294967295 |
detectionThresholdPercentage integer |
Specifies the TCP attack detection percentage increase for the configured attack type. Note: The minimum and maximum values are 0 and 4294967295, respectively. |
4294967295 |
UDP Flood Vectors¶
This table lists all the UDP Flood Vectors parameters for object
types:
Parameter | Description | Support for Hardware Acceleration |
---|---|---|
vectors.udpFlood |
This vector prevents the UDP flood. UDP port lists can be enabled for mitigation. Attack is detected or ratelimited based on the state and rate-limit configuration. Provides both per-sourceIP and per-destinationIP detection and rate-limiting. | Yes |
This table lists all the common config parameters common for UDP Flood Vectors vectors.
Parameter | Description | Default |
---|---|---|
detectionThresholdEps integer |
Specifies the IPv6 attack detection threshold in EPS for the configured attack type. Note: The minimum and maximum values are 0 and 4294967295, respectively. |
4294967295 |
detectionThresholdPercentage integer |
Specifies the IPv6 attack detection percentage increase for the configured attack type. Note: The minimum and maximum values are 0 and 4294967295, respectively. |
4294967295 |
rateLimit integer |
Specifies the rate limit in EPS for the configured IPv6 attack type. Note: The minimum and maximum values are 0 and 4294967295, respectively. |
4294967295 |
perSrcIpDetectionEps integer |
Specifies the IPv6 attack detection threshold in EPS for the configured attack type per source IP. Note: The minimum and maximum values are 0 and 4294967295, respectively. |
4294967295 |
perSrcIpLimitEps integer |
Specifies the rate limit in EPS for the configured IPv6 attack type source IP. Note: The minimum and maximum values are 0 and 4294967295, respectively. |
4294967295 |
perDstIpDetectionEps integer |
Specifies the attack detection threshold in EPS for the configured IPv6 attack type per destination IP. Note: The minimum and maximum values are 0 and 4294967295, respectively. |
4294967295 |
perDstIpLimitEps integer |
Specifies the rate Limit in EPS for the configured IPv6 attack type per destination IP. Note: The minimum and maximum values are 0 and 4294967295, respectively. |
4294967295 |
udpPortLists Object |
List of the UDP ports, that need to be either excluded or included in detecting the UDP flood. Refer to below table for udpPortLists Parameters |
udpPortLists Parameters
Parameters | Description | Default |
---|---|---|
listType string |
Specifies the list of ports excluded. Available options: - exclude-listed-ports - include-listed-ports |
exclude-listed-ports |
entries array |
Specify the port and matchDirection. Note: You must specify port. |
UDP Error Vectors¶
This table lists all the UDP Error parameters for object
types:
Parameter | Description | Support for Hardware Acceleration |
---|---|---|
vectors.badUdpChecksum |
This vector detects attack traffic with incorrect UDP checksums. When enabled, an attack is detected and dropped based on the threshold configuration. | Yes |
vectors.badUdpHdr |
This vector detects attack traffic with a UDP header length greater than the IP length or Layer 2 length. When enabled, attack is detected and dropped based on the threshold configuration. | Yes |
This table lists all the common config parameters common for UDP Error vectors.
Parameter | Description | Default |
---|---|---|
detectionThresholdEps integer |
Specifies the UDP attack detection threshold in EPS for the configured attack type. Note: The minimum and maximum values are 0 and 4294967295, respectively. |
4294967295 |
detectionThresholdPercentage integer |
Specifies the UDP attack detection percentage increase for the configured attack type. Note: The minimum and maximum values are 0 and 4294967295, respectively. |
4294967295 |
Common Flood Vectors¶
This table lists all the Common Flood Vectors parameters for object
types:
Parameter | Description |
---|---|
vectors.noListenerMatch |
This vector detects attack traffic sent to BIGIP, that doesn’t match with any listeners configured. Attack is detected or ratelimited based on the state and rate-limit configuration. Provides both per-sourceIP and per-destinationIP detection and rate limiting. |
vectors.uncommonIpProtocols |
This vector detects the configured excluded IP protocols traffic. Attack is detected or ratelimited based on the state and rate-limit configuration. Provides both per-sourceIP and per-destinationIP detection and rate-limiting. |
vectors.unknownIpProtocols |
This vector detects attack traffic with an unknown or undetermined protocol. Attack is detected or dropped according to the state and rate limit configuration. |
This table lists all the common config parameters common for Common Flood vectors.
Parameter | Description | Default |
---|---|---|
detectionThresholdEps integer |
Specifies the IPv6 attack detection threshold in EPS for the configured attack type. Note: The minimum and maximum values are 0 and 4294967295, respectively. |
4294967295 |
detectionThresholdPercentage integer |
Specifies the IPv6 attack detection percentage increase for the configured attack type. Note: The minimum and maximum values are 0 and 4294967295, respectively. |
4294967295 |
rateLimit integer |
Specifies the rate limit in EPS for the configured IPv6 attack type. Note: The minimum and maximum values are 0 and 4294967295, respectively. |
4294967295 |
perSrcIpDetectionEps integer |
Specifies the IPv6 attack detection threshold in EPS for the configured attack type per source IP. Note: The minimum and maximum values are 0 and 4294967295, respectively. |
4294967295 |
perSrcIpLimitEps integer |
Specifies the rate limit in EPS for the configured IPv6 attack type source IP. Note: The minimum and maximum values are 0 and 4294967295, respectively. |
4294967295 |
perDstIpDetectionEps integer |
Specifies the attack detection threshold in EPS for the configured IPv6 attack type per destination IP. Note: The minimum and maximum values are 0 and 4294967295, respectively. |
4294967295 |
perDstIpLimitEps integer |
Specifies the rate Limit in EPS for the configured IPv6 attack type per destination IP. Note: The minimum and maximum values are 0 and 4294967295, respectively. |
4294967295 |
excludedIpProtcols array |
All the IP protocols that need to be excluded are listed below. These protocols are considered Common IP protocols and should not be detected or mitigated by uncommonIPprotocol vectors. Refer to below table for excludedIpProtcols Parameters. Note: This is applicable for uncommonIpProtocols |
excludedIpProtcols Parameters
Parameter | Description | Default |
---|---|---|
Configuring one or more IP protocol(s) string(s) from the enumerated list will exclude them from being subjected to detection/mitigation threshold by uncommonIPprotocol vector. If nothing is configured, then all the IP protocols defined in the default list will be excluded from being subjected to detection/mitigation threshold by uncommonIpProtocol vector. Enumerated list act as an Universal list of protocols. Item "any" act as wildcard element for the list of IP protocols in mBIP. | ah, any, esp, etherip, gre, hopopt, icmp, igmp,ipcomp, ipip, ipv4, ipv6, ipv6-frag, ipv6-icmp,ipv6-nonxt, ipv6-opts, ipv6-route, mobility-header,ospf, pim, sctp, tcp, udp |
Common Error Vectors¶
This table lists all the Common Error Vectors parameters for object
types:
Parameter | Description |
---|---|
vectors.landAttack |
This vector detects attack traffic where the Source IP is the same as the destination IP address. When enabled, attack is detected and dropped based on the threshold configuration. |
vectors.badSctpChecksum |
This vector detects attack traffic with incorrect SCTP checksum. When enabled, an attack is detected and dropped based on the threshold configuration. |
This table lists all the common config parameters common for TCP Error vectors.
Parameter | Description | Default |
---|---|---|
detectionThresholdEps integer |
Specifies the common error detection threshold in EPS for the configured attack type. Note: The minimum and maximum values are 0 and 4294967295, respectively. |
4294967295 |
detectionThresholdPercentage integer |
Specifies the common error detection percentage increase for the configured attack type. Note: The minimum and maximum values are 0 and 4294967295, respectively. |
4294967295 |
DNS Flood Vectors¶
This table lists all the DNS Flood Vectors parameters for object
types:
Parameter | Description |
---|---|
vectors.dnsAQuery |
This vector detects DNS packets with Qtype as A_QRY. Attack is detected or dropped based on the state and rate limit configuration. Provides both per-sourceIP and per-destinationIP detection and rate limiting. |
vectors.AaaaQuery |
This vector detects DNS packets with Qtype as AAAA. Attack is detected or dropped according to the state and rate limit configuration. Provides both per-sourceIP and per-destinationIP detection and rate limiting. |
vectors.dnsAnyQuery |
This vector detects DNS packets with Qtype as AAAA. Attack is detected or dropped according to the state and rate limit configuration. Provides both per-sourceIP and per-destinationIP detection and rate limiting. |
vectors.dnsPtrQuery |
This vector detects DNS packets with Qtype as PTR. Attack is detected or dropped per state and rate limit configuration. Provides both per-sourceIP and per-destinationIP detection and rate limiting. |
vectors.dnsAxfrQuery |
This vector detects DNS packets with Qtype as AXFR. Attack is detected or dropped according to the state and rate limit configuration. Provides both per-sourceIP and per-destinationIP detection and rate limiting. |
vectors.dnsCnameQuery |
This vector detects DNS packets with DNS Qtype as CNAME. Attack is detected or dropped based on the state and rate limit configuration. Provides both per-sourceIP and per-destinationIP detection and rate limiting. |
vectors.dnslxfrQuery |
This vector detects DNS packets with DNS Qtype as IXFR. Attack is detected or dropped according to the state and rate limit configuration. Provides both per-sourceIP and per-destinationIP detection and rate limiting. |
vectors.dnsMxQuery |
This vector detects the DNS packets with DNS Qtype as MX. Attack is detected or dropped based on the state and rate limit configuration. Provides both per-sourceIP and per-destinationIP detection and rate limiting. |
vectors.dnsNsQuery |
This vector detects DNS packets with DNS Qtype as NS. Attack is detected or dropped according to the state and rate limit configuration. Provides both per-sourceIP and per-destinationIP detection and rate limiting. |
vectors.dnsOtherQuery |
This vector detects DNS packets with DNS Qtype as OTHER. Attack is detected or dropped based on the state and rate limit configuration. Provides both per-sourceIP and per-destinationIP detection and rate limiting. |
vectors.dnsSoaQuery |
This vector detects DNS packets with DNS Qtype as SOA_QRY. Attack is detected or dropped according to the state and rate limit configuration. Provides both per-sourceIP and per-destinationIP detection and rate limiting. |
vectors.dnsSrvQuery |
This vector detects DNS packets with DNS Qtype as SRV. Attack is detected or dropped based on the state and rate limit configuration. Provides both per-sourceIP and per-destinationIP detection and rate limiting. |
vectors.dnsTxtQuery |
This vector detects DNS packets with DNS Qtype as TXT. Attack is detected or dropped according to the state and rate limit configuration. Provides both per-sourceIP and per-destinationIP detection and rate limiting. |
vectors.oversizedDns |
This vector detects oversized DNS headers. Attack is detected or ratelimited based on the state and rate-limit configuration. Provides both per-sourceIP and per-destinationIP detection and rate-limiting. |
vectors.dnsNxdomainQuery |
This vector detects DNS queries for non-existing domains. Attack is detected or dropped according to the state and rate limit configuration. Provides both per-sourceIP and per-destinationIP detection and rate limiting. |
This table lists all the common config parameters common for DNS Flood vectors.
Parameter | Description | Default |
---|---|---|
state string |
Specifies the response for DNS vector match: detection-only or mitigation. Note: To disable, delete the custom resource. |
detection-only |
detectionThresholdEps integer |
Specifies the IPv6 attack detection threshold in EPS for the configured attack type. Note: The minimum and maximum values are 0 and 4294967295, respectively. |
4294967295 |
detectionThresholdPercentage integer |
Specifies the IPv6 attack detection percentage increase for the configured attack type. Note: The minimum and maximum values are 0 and 4294967295, respectively. |
4294967295 |
rateLimit integer |
Specifies the rate limit in EPS for the configured IPv6 attack type. Note: The minimum and maximum values are 0 and 4294967295, respectively. |
4294967295 |
perSrcIpDetectionEps integer |
Specifies the IPv6 attack detection threshold in EPS for the configured attack type per source IP. Note: The minimum and maximum values are 0 and 4294967295, respectively. |
4294967295 |
perSrcIpLimitEps integer |
Specifies the rate limit in EPS for the configured IPv6 attack type source IP. Note: The minimum and maximum values are 0 and 4294967295, respectively. |
4294967295 |
perDstIpDetectionEps integer |
Specifies the attack detection threshold in EPS for the configured IPv6 attack type per destination IP. Note: The minimum and maximum values are 0 and 4294967295, respectively. |
4294967295 |
perDstIpLimitEps integer |
Specifies the rate Limit in EPS for the configured IPv6 attack type per destination IP. Note: The minimum and maximum values are 0 and 4294967295, respectively. |
4294967295 |
maxDnsSize integer |
Specifies the allowed maximum size for DNS. Note: - The minimum and maximum values are 256 and 8191, respectively. - This is applicable for oversizedDns. |
4096 |
validDomains | Define the list of domains that the vector should consider as valid domains. |
DNS Error Vectors¶
This table lists all the DNS Error Vectors parameters for object
types:
Parameter | Description |
---|---|
vectors.dnsMalformed |
This vector detects the malformed DNS packets. When enabled, an attack is detected and dropped based on the threshold configuration. |
vectors.dnsQdCountLimit |
This vector detects DNS packets with a DNS qdcount not equal to 1. When enabled, an attack is detected and dropped based on the threshold configuration. |
vectors.unsolicitedDnsResponse |
This vector detects DNS packets with DNS header flags bit 15 set as 1 (response). When enabled, an attack is detected and dropped based on the threshold configuration. |
This table lists all the common config parameters common for DNS Error Flood vectors.
Parameter | Description | Default |
---|---|---|
detectionThresholdEps integer |
Specifies the IPv6 attack detection threshold in EPS for the configured attack type. Note: The minimum and maximum values are 0 and 4294967295, respectively. |
4294967295 |
detectionThresholdPercentage integer |
Specifies the IPv6 attack detection percentage increase for the configured attack type. Note: The minimum and maximum values are 0 and 4294967295, respectively. |
4294967295 |
L2 Flood Vectors¶
This table lists all the L2 Flood Vectors parameters for object
types:
Parameter | Description | Support for Hardware Acceleration |
---|---|---|
vectors.etherBroadcastPkt |
This vector detects the traffic with broadcast as the Ethernet destination address. Attack is detected or dropped according to the state and rate limit configuration. | Yes |
vectors.etherMulticastPkt |
This vector detects traffic with a multicast set for the Ethernet destination address. Attack is detected or dropped according to the state and rate limit configuration. | Yes |
vectors.arpFlood |
This vector detects the ARP flood in the network. Attack is detected or dropped based on the state and rate limit configuration. | Yes |
vectors.etherSrcEqualDstAddr |
This vector detects traffic with Ethernet MAC source address same as the destination address. When enabled, attack is detected and dropped based on the threshold configuration. | No |
vectors.l2LenGtIpLen |
This vector detects attack traffic with Layer 2 packet length significantly exceeding the payload length in an IPv4 address header, and the Layer 2 length surpasses the minimum packet size. Attack is detected or dropped per the state and rate limit configuration. | No |
vectors.singleEndpointSweep |
Single endpoint vector. This vector tracks packets by their source address. Packets from a specific source that match the packet-type specified in this vector and exceed the rate limit are dropped. |
No |
vectors.singleEndpointFlood |
Single endpoint vector. This vector tracks packets by their destination address. Packets to a specific destination that match the packet-type specified in this vector and exceed the rate limit are dropped. |
No |
vectors.badIcmpChecksum |
ICMP error vector. This vector detects the attack traffic with incorrect ICMP checksum. When enabled, attack is detected and dropped based on the threshold configuration. |
No |
vectors.badIcmpFrame |
ICMP error vector. This vector detects attack traffic where the ICMP frame is of the wrong size, or not among one of the valid IPV4/IPV6 types. When enabled, an attack is detected and dropped based on the threshold configuration. |
No |
vectors.icmpFragFlood |
ICMP flood vector. This vector is detected when a flood of ICMP fragments is observed. Attack is detected or ratelimited based on the state and rate-limit configuration. Provides both per-sourceIP and per-destinationIP detection and rate limiting. |
Yes |
vectors. icmpFrameTooLarge |
ICMP flood vector. This vector is detected when a flood of traffic with the ICMP frame exceeds the default maximum datagram length (1500 bytes). Attack is detected or ratelimited based on the state and rate-limit configuration. |
No |
vectors.hostUnreachable |
ICMP flood vector. This vector is detected when a flood of ICMP traffic with host unreachable error is observed. Attack is detected or ratelimited based on the state and rate limit configuration. Provides both per-sourceIP and per-destinationIP detection and rate limiting. |
Yes |
vectors.badIgmpFrame |
IGMP error vector. This vector detects the attack traffic with incorrect IGMP frames. When enabled, attack is detected and dropped based on the threshold configuration. |
Yes |
igmpFlood |
IGMP flood vector. This vector is detected when a flood of traffic with the IGMP IPV4 packets with IP protocol number 2 is observed. Attack is detected or ratelimited based on the state and rate limit configuration. Provides both per-sourceIP and per-destinationIP detection and rate-limiting. |
Yes |
vectors.igmpFragFlood |
IGMP flood vector. This vector is detected when a flood of IGMP fragments is observed. Attack is detected or ratelimited based on the state and rate limit configuration. Provides both per-sourceIP and per-destinationIP detection and rate limiting. |
No |
This table lists all the common config parameters common for L2 Flood vectors.
Parameter | Description | Default |
---|---|---|
Parameter | Description | Default |
state string |
Specifies the response for DNS vector match: detection-only or mitigation. Note: To disable, delete the custom resource. |
detection-only |
detectionThresholdEps integer |
Specifies the IPv6 attack detection threshold in EPS for the configured attack type. Note: The minimum and maximum values are 0 and 4294967295, respectively. |
4294967295 |
detectionThresholdPercentage integer |
Specifies the IPv6 attack detection percentage increase for the configured attack type. Note: The minimum and maximum values are 0 and 4294967295, respectively. |
4294967295 |
rateLimit integer |
Specifies the rate limit in EPS for the configured IPv6 attack type. Note: The minimum and maximum values are 0 and 4294967295, respectively. |
4294967295 |
perSrcIpDetectionEps integer |
Specifies the IPv6 attack detection threshold in EPS for the configured attack type per source IP. Note: The minimum and maximum values are 0 and 4294967295, respectively. |
4294967295 |
perSrcIpLimitEps integer |
Specifies the rate limit in EPS for the configured IPv6 attack type source IP. Note: The minimum and maximum values are 0 and 4294967295, respectively. |
4294967295 |
perDstIpDetectionEps integer |
Specifies the attack detection threshold in EPS for the configured IPv6 attack type per destination IP. Note: The minimum and maximum values are 0 and 4294967295, respectively. |
4294967295 |
perDstIpLimitEps integer |
Specifies the rate limit in EPS for the configured IPv6 attack type per destination IP. Note: The minimum and maximum values are 0 and 4294967295, respectively. |
4294967295 |
packetTypes array |
Define the list of packet types that will be considered for the detection of this vector. |