/
Reconnaissance

Reconnaissance

Reconnaissance attacks consist of attempts to get information on the network environment before launching a large DDoS or other types of attacks. Techniques include port scanning and finding versions and authors. These attacks exhibit abnormal behavior patterns that, if identified, can provide early warnings.

The following table lists the auto rules that are used to mitigate reconnaissance attacks on your advanced appliance.

You can configure the following rule parameter for all rules in this category:

  • Events per second: The number of events logged per second for the rule. Setting a value to 0 (zero) disables the appliance from logging events for the rule. The default value is 10.
Rule IDRule TypeRule NameDescription

Enable Condition

ParametersComments
110100100Auto

EARLY DROP DNS named author attempts

This rule drops UDP DNS packets that contain attempts to find AUTHOR information.

Always enabled.

Events per second (default = 1)


110100200Auto

EARLY DROP DNS named version attempts

This rule drops UDP DNS packets that contain attempts to find  VERSION information.

Always enabled.

Events per second (default = 1)