TMS Mitigation Status DoS Alert 65153 IPv4
TMS Mitigation Status DoS Alert 65153 IPv4
TMS Mitigation Status DoS Alert 65153 IPv4
NETSCOUT | Arbor Sightline : TMS Mitigation Status "DoS Alert 65153" (IPv4) Sat 18 Jul 2020 23:10:00 UTC
Summary
1 Min Avg 5 Min Avg Summary Avg 1 Min Avg 5 Min Avg Summary Avg
Dropped: 57.0 Kbps 616.0 Mbps 673.3 Mbps Dropped: 139.3 pps 58.8 Kpps 64.3 Kpps
Passed: 2.1 Mbps 33.0 Mbps 35.7 Mbps Passed: 574.9 pps 4.2 Kpps 4.5 Kpps
Total: 2.1 Mbps 649.0 Mbps 709.1 Mbps Total: 714.1 pps 63.0 Kpps 68.8 Kpps
Percent Dropped: 2.70% 94.92% 94.96% Percent Dropped: 19.50% 93.34% 93.47%
Blocked Hosts: 0 hosts 0 hosts 0 hosts Blocked Hosts: 0 hosts 0 hosts 0 hosts
1 Min Avg 5 Min Avg Summary Avg 1 Min Avg 5 Min Avg Summary Avg
ATENTO-TMS-01 57.01 Kbps 616.02 Mbps 673.35 Mbps ATENTO-TMS-01 139.29 pps 58.83 Kpps 64.33 Kpps
page 1 of 9
Black/White Lists Invalid Packets TCP SYN Authentication Black/White Lists Invalid Packets TCP SYN Authentication
DNS Authentication
page 2 of 9
Countermeasures
Timeframe: 5 minutes
Example:
pass port 80 and src 192.168.6.0/24
Inline Filters drop src 192.168.5.0/24 and proto tcp and tflags S/SA
drop udp frag
Blacklists every source that has any traffic dropped because of the Black/White Lists. All traffic from these sources is then dropped, including traffic that matches a
Blacklist Sources pass rule in the Black/White Lists.
Disabled
Filter List: Total
page 3 of 9
Dropped: 0 bps 0 pps
CLDAP: Disabled
L2TP: Disabled
L2TP Match Expression: proto udp and src port 1701 and bytes 500..65535
mDNS: Disabled
memcached: Disabled
NetBIOS: Disabled
NetBIOS Match Expression: proto udp and (src port 137 or src port 138)
NTP: Disabled
NTP Match Expression: proto udp and src port 123 and not bytes 76
RIPv1: Disabled
rpcbind: Disabled
SNMP: Disabled
SNMP Match Expression: proto udp and (src port 161 or src port 162)
SSDP: Disabled
Custom 1: Disabled
Match Expression:
Custom 2: Disabled
Match Expression:
DNS: Enabled
page 4 of 9
NTP: 0 bps 0 pps
RIPv1: 0 bps 0 pps
rpcbind: 0 bps 0 pps
SNMP: 0 bps 0 pps
SSDP: 0 bps 0 pps
Custom 1: 0 bps 0 pps
Custom 2: 0 bps 0 pps
DNS: 0 bps 0 pps
Requires the browser of the source host to be able to run JavaScript before a TCP connection can be authenticated.
Require JavaScript for HTTP Authentication
Disabled
HTTP Ports Example: '80' (Leave blank to use default '80, 8080')
page 5 of 9
Dropped: 0 bps 0 pps
Most users should not need to edit the advanced settings. Application Slow Request Attack Prevention is designed to operate automatically using the preset configuration settings.
The prevention level blacklists hosts that violate configured levels of malformed HTTP traffic checks. When you raise the enforcement level to Medium or High, the countermeasure matches
and drops more types of HTTP traffic with a higher risk of dropping good traffic.
page 6 of 9
Dropped: 0 bps 0 pps
page 7 of 9
Dropped: 0 bps 0 pps
page 8 of 9
Annotations
Mitigation stopped.
Mitigation started.
Click the arrow next to a traffic element or traffic pattern to add it to your Alert Scratchpad.
page 9 of 9