FS#5221 — FS#9145 — TCP/SYN port 53
Attached to Project— Anti-DDoS
Modernization | |
Paris DC1 | |
CLOSED | |
![]() |
The Arbor TMS boxes manage port 53 via a
DNS AUTH specific protection. The base
configuration forces the TCP/SYN
protection to ignore port 53.
This causes some problems when
port TCP/53 is attacked.
We have set up a customised
configuration which enables TCP/53
packet filtration on the TCP AUTH
but not on the DNS AUTH.
# services tms registry main clear mitigation.tcp_syn.ignore_dst_ports
Registry key 'mitigation.tcp_syn.ignore_dst_ports' successfully cleared.
Date: Tuesday, 13 August 2013, 16:11PMDNS AUTH specific protection. The base
configuration forces the TCP/SYN
protection to ignore port 53.
This causes some problems when
port TCP/53 is attacked.
We have set up a customised
configuration which enables TCP/53
packet filtration on the TCP AUTH
but not on the DNS AUTH.
# services tms registry main clear mitigation.tcp_syn.ignore_dst_ports
Registry key 'mitigation.tcp_syn.ignore_dst_ports' successfully cleared.
Reason for closing: Done