Skip to main content
Version: 1.6

XND module configuration

Introduction to XND configuration

The following section describes the configuration procedure for the detection mechanism and prevention of DDoS attacks implemented in the XND module. This mechanism extends XNS (Security) module capabilities with advanced detection algorithms and defense mechanisms against DDoS attacks.

Detection of DDoS attacks can be performed by the security threat detection engine (XNS module) as well as an advanced mechanism to detect and prevent DDoS attacks (XND module). The list of rules for detecting DDoS attacks in XNS module can be found below in Table 4.1.1.

Rule NameDescription
DDoS Attack DetectedThis rule detects DDoS Attacks based on traffic volume from multiple IP addresses to a single destination IP on the same port. The attack involves saturating network resources causing disruption of normal traffic on the target server. For the rule to work correctly, configure the Counter Threshold and Whitelist groups.
DDoS DNS Amplification AttackThis rule detects DDoS DNS Amplification Attacks based on network traffic statistics (Signature 1). To create heavy traffic, an attacker sends a request in a way that generates the largest possible response from DNS name resolution services. As a result, the target receives reinforcement of the initial attacker's traffic, and their network is clogged with false traffic, which causes denial of service. For the rule to work correctly, configure the following attributes: Flow Count and PPF (Packets Per Flow).
DoS Attack DetectedThis rule detects DoS Attacks based on traffic volume from one IP address to single IPs on a specific port. For the rule to work correctly, configure the Port Threshold List format as follows: Flows_Threshold\ Port\ Service and Whitelist groups.
DoS - ICMP FloodThis rule detects DoS ICMP attacks. An attacker can send a large number of ICMP packets to consume all available bandwidth of a victim's host. For the rule to work correctly, configure the following attributes: Flow Count, PPF (Packets per Flow), PPM (Packets Per Minute) and Whitelist groups.
DoS - TCP FloodThis rule detects TCP DoS attacks. An attacker can send a large number of TCP packets to one or several ports of the victim, which eventually renders the attacked host unable to process the incoming packets. For the rule to work correctly, configure the following attributes: Flow Count, PPF (Packets per Flow), PPM (Packets Per Minute) and Whitelist groups.
DoS - UDP FloodThis rule detects DoS UDP attacks. An attacker can send a large number of UDP packets to consume all available bandwidth of the victim's host. For the rule to work correctly, configure the following attributes: Flow Count, PPF (Packets per Flow), PPM (Packets Per Minute) and Whitelist groups.

Table 4.1.1 DDoS rules list in XNS module

XND module configuration steps

  1. Create function groups (to be used in the XND mechanism) in the network map (Settings/Mapping/Groups/Function). A function group is a group of IP addresses that is monitored. The function group can be given its own name (Fig. 4.2.1).

image-20201112130355880

Fig. 4.2.1 Function group configuration

  1. Configure XND basic module (Fig. 4.2.2)

image-20201112130435787

Fig. 4.2.2 DDoS basic configuration

Rule AttributeDescription
EnabledDetermining whether the rule is enabled
Alert NameThe name of the rule is “DDoS Attack Detected – XND”, but the name of the alarms of this rule are START: DDoS Attack Detected - XND" and "STOP: DDoS Attack Detected - XND".
Threat CategoryThreat category according to FlowControl nomenclature.
ScoreCriticality of alarm on a scale 1-10: 10-9 Critical, 8-7 High, 6-4 Medium, 3-2 Low.
MITRE TacticTactical name according to MITRE technique.
MITRE TechniqueTechnique name according to MITRE technique.
ASN WhitelistWhitelist of source ASNs, i.e. ASNs to filtered out of by XND module mechanism.
Service WhitelistList of services excluded from the attack mitigation mechanism – alerts are still generated. Examples of Whitelist records:
(1) (Destination_IP,Port) – blocks the selected services for specified IP address
(2) (Destination_IP,) – blocks all services for the specified IP address
(3) (Subnet,Port) – blocks the service for hosts in specified subnet
means all ports

Table 4.2.1 XND module DDoS basic configuration

  1. Configure DDoS parameters for individual function groups (Fig. 4.2.3, Fig. 4.2.4)

image-20201112130508003

Fig. 4.2.3 Configuration of a DDoS parameters for monitored groups.

image-20201112130536345

Fig. 4.2.4 DDoS parameters configuration for selected function groups.

  1. Configure DDoS Mitigation (Fig. 4.2.5)

image-20210620134554280

Fig. 4.2.5 FlowSpec BGP configuration

BGP NEIGHBORS

Configuration AttributeDescription
EnabledEnabled/Disabled BGP support
FCXN ASBGP ASN number of FCXN system
FCXN BGP PortBGP port of FCXN system
FCXN BGP IDBGP ID of FCXN system
Blackhole IP (RTHB)Blackhole IP address. Static route must be configured on the router that re-directs traffic destined to this IP to Null or discard interface.
Neighbor IPIP address of the neighboring router
Neighbor ASBGP ASN number of the neighboring router
BGP Hold TimeBGP Hold Time interval of FCXN system
ModeMitigation type: FlowSpec or RTBH
StatusBGP connection status:
Listening / Waiting for connection - System FCXN waiting for BGP connection to be initiated by the router. Not connected: remote AS different than expected (LocalAS) – disconnected. ASN number given is different from that configured on the router.
Disconnected by neighbor – BGP connection was interrupted by the router. After a few seconds the status should change to “Waiting for connection”.
Disconnected – BGP connection was interrupted by the FCXN system (e.g. after changing the settings). After a few seconds the status should change to “Waiting for connection”.
Disconnected: other error (report to Tech Support) – BGP connection interrupted for other reasons. After a few seconds the status should change to “Waiting for connection”.
Connected – BGP connection established with the router. The field may contain additional information:
actual HoldTime different than expected – Hold Time parameter give in the settings is different from that configured on the router.
not sending IPv4/IPv6 AS paths – Path option is enabled, but the router is not configured to send BGP ASN tracks.
exported IPv4/IPv6 AS paths ignored – Router is configured to send BGP ASN tracks, but Paths option is disabled. Paths are ignored.
no FlowSpec IPv4/IPv6 support – FlowSpec option is enabled, but the router does not support this protocol.
* FlowSpec IPv4/IPv6 support can be turned off – Router supports FlowSpec, but in FCXN settings this option is disabled. FlowSpec rules are not sent to the router.

Table 4.2.2 BGP FlowSpec configuration parameters

Click the ADD NEW button and configure router

mage-20201113150507633

Configuration AttributeDescription
Neighbor IPIP address of the neighboring router
Neighbor ASBGP ASN number of the neighboring router
BGP Hold TimeBGP Hold Time interval of FCXN system
Paths(Not implemented yet)
ModeMitigation type: FlowSpec, RTBH or None

MANUAL BLOK IP

Click the ADD NEW button and configure Manual Block IP

image-20210620135650109

Configuration AttributeDescription
Dst. IPDestination IP address with a mask (IP/Mask)
Dst. PortDestination port (0-65535)
Src. IPSource IP address with a mask (IP/Mask)
Src. PortSource port (0-65535)
DescriptionRule description (Text)
UserFilled automatically
Added TimeFilled automatically

6) Check which services are blocked by BGP FlowSpec (Fig. 4.2.6).

image-20201112130645504

Fig. 4.2.6 Displaying services blocked by BGB FlowSpec

image-20210620135650109