ike-access-control
The ike-access-control configuration element defines the allowlist, blocklist, and DDoS parameters to be used by the ike-interface to which it is applied.
Syntax
- name
- Establishes the name of this ike-access-control object.
- state
- Enables or disables this ike-access-control object.
- identifiers
- Specifies a list of allowlist identifier prefixes (^ used as a wildcard for a single hexadecimal digit, + or - used for adding or removing prefix.
- blocklisted-identifiers
- Specifies a list of blocklist identifier prefixes (^ used as a wildcard for a single hexadecimal digit, + or - used for adding or removing prefix.
- deny-period
- Specifies the quarantine period imposed on an endpoint that
transitions to the deny state. During the quarantine period, the endpoint is
denied all access to the IKEv2 interface.
deny-period and tolerance-window must both be set to non-zero values to enable IKEv2 DDoS protection.
- tolerance-window
- Specifies the interval (in seconds) between checks of endpoint-specific traffic counters.
- pre-ipsec-invalid-threshold
- Enables protection against a DDoS attack that consists of malformed, or
otherwise invalid, packets during the IKEv2 SA negotiation process by
specifying the maximum number of malformed IKEv2 SA packets tolerated from a
specific endpoint within the interval set by the tolerance-window parameter. These attacks can attempt to
consume system resources in a futile effort to complete negotiation of IKEv2
SAs.
If this threshold value is reached, the endpoint is quarantined for an interval defined by the deny-period parameter.
- Default: 0 (disabled)
- Values: Min: 0 / Max: 999999999 (packets)
- pre-ipsec-maximum-threshold
- Specifies the maximum number of valid IKEv2 SA packets tolerated
from a specific endpoint within the interval set by the
tolerance-window
parameter. These attacks can attempt to prolong the IKEv2 negotiation by
persistently renegotiating the IKEv2 SA.
If this threshold value is reached, the endpoint is quarantined for an interval defined by the deny-period parameter.
- Default: 0 (disabled)
- Values: Min: 0 / Max: 999999999 (packets)
- after-ipsec-invalid-threshold
- Enables protection against a DDoS attack that consists of malformed, or
otherwise invalid, packets after SA setup by specifying the maximum number
of malformed packets tolerated from a specific endpoint within the interval
set by the tolerance-window parameter. These attacks can attempt to
consume system resources in a futile effort to complete negotiation of IKEv2
SAs.
If this threshold value is reached, the endpoint is quarantined for an interval defined by the deny-period parameter.
- Default: 0 (disabled)
- Values: Min: 0 / Max: 999999999 (packets)
- after-ipsec-maximum-threshold
- Specifies the maximum number of valid IKEv2 packets tolerated
after SA setup from a specific endpoint within the interval set by the
tolerance-window parameter. These attacks
can attempt to prolong the IKEv2 negotiation by persistently renegotiating the
IKEv2 SA.
If this threshold value is reached, the endpoint is quarantined for an interval defined by the deny-period parameter.
- Default: 0 (disabled)
- Values: Min: 0 / Max: 999999999 (packets)
- auth-failure-threshold
- Specifies the maximum number of unsuccessful authentication messages tolerated
from a specific endpoint within the interval set by the tolerance-window parameter. These attacks attempt to
consume system resources by persistently presenting invalid credentials
during the endpoint authentication process.
If this threshold value is reached, the endpoint is quarantined for an interval defined by the deny-period parameter.
- Default: 0 (disabled)
- Values: Min: 0 / Max: 999999999 (authentication attempts)
- auth-critical-failure-threshold
- Specifies the maximum number of authentication critical failures
tolerated from a specific endpoint within the interval set by the
tolerance-window parameter. These attacks
attempt to consume system resources by persistently presenting invalid
credentials during the endpoint authentication process.
If this threshold value is reached, the endpoint is quarantined for an interval defined by the deny-period parameter.
- Default: 0 (disabled)
- Values: Min: 0 / Max: 999999999 (authentication attempts)
- auth-failure-report
- Specifies how failed authentications are reported. Used in
conjunction with the
auth-failure-threshold
- no-reporting—(the default), authentication failures are not reported
- snmp-trap-only—authentication failures are reported by generating an SNMP trap (refer to "SNMP Trap" for information of trap structure)
- syslog-only—authentication failures are reported by sending a syslog message
- snmp-trap-and-syslog—authentication failures are reported with both an SNMP trap and a syslog message
Path
ike-access-control is a subelement under the ike element. The full path from the topmost ACLI prompt is: configure terminal, security, ike, ike-access-control.
Note:
This is a multiple instance configuration element.