IP Defragmentation Options
You can choose to simply enable or disable IP defragmentation; however, Cisco recommends that you specify the behavior of the enabled IP defragmentation preprocessor at a more granular level.
If no preprocessor rule is mentioned in the following descriptions, the option is not associated with a preprocessor rule.
You can configure the following global option:
Preallocated Fragments
The maximum number of individual fragments that the preprocessor can process at once. Specifying the number of fragment nodes to preallocate enables static memory allocation.
Caution | Processing an individual fragment uses approximately 1550 bytes of memory. If the preprocessor requires more memory to process the individual fragments than the predetermined allowable memory limit for the managed device, the memory limit for the device takes precedence. |
You can configure the following options for each IP defragmentation policy:
Networks
The IP address of the host or hosts to which you want to apply the defragmentation policy.
You can specify a single IP address or address block, or a comma-separated list of either or both. You can specify up to 255 total profiles, including the default policy.
Note that the
default
setting in the default policy specifies all IP
addresses on your monitored network segment that are not covered by another
target-based policy. Therefore, you cannot and do not need to specify an IP
address or CIDR block/prefix length for the default policy, and you cannot
leave this setting blank in another policy or use address notation to represent
any
(for example, 0.0.0.0/0 or ::/0).
Policy
The defragmentation policy you want to use for a set of hosts on your monitored network segment.
You can select one of seven defragmentation policies, depending on the operating system of the target host. The following table lists the seven policies and the operating systems that use each one. The First and Last policy names reflect whether those policies favor original or subsequent overlapping packets.
This option is ignored for threat defense routed and transparent interfaces.
Policy |
Operating Systems |
---|---|
BSD |
AIX FreeBSD IRIX VAX/VMS |
BSD-right |
HP JetDirect |
First |
Mac OS HP-UX |
Linux |
Linux OpenBSD |
Last |
Cisco IOS |
Solaris |
SunOS |
Windows |
Windows |
Timeout
Specifies the maximum amount of time, in seconds, that the preprocessor engine can use when reassembling a fragmented packet. If the packet cannot be reassembled within the specified time period, the preprocessor engine stops attempting to reassemble the packet and discards received fragments.
Min TTL
Specifies the minimum acceptable TTL value a packet may have. This option detects TTL-based insertion attacks.
You can enable rule 123:11 to generate events and, in an inline deployment, drop offending packets for this option.
Detect Anomalies
Identifies fragmentation problems such as overlapping fragments.
This option is ignored for threat defense routed and transparent interfaces.
You can enable the following rules to generate events and, in an inline deployment, drop offending packets for this option:
-
123:1 through 123:4
-
123:5 (BSD policy)
-
123:6 through 123:8
Overlap Limit
Specifies that when the configured number of overlapping segments in a session has been detected, defragmentation stops for that session.
You must enable Detect Anomalies to configure this option. A blank value disables this option. A value of 0 specifies an unlimited number overlapping segments.
This option is ignored for threat defense routed and transparent interfaces. Overlapping fragments are always dropped on those interfaces.
You can enable rule 123:12 to generate events and, in an inline deployment, drop offending packets for this option.
Minimum Fragment Size
Specifies that when a non-last fragment smaller than the configured number of bytes has been detected, the packet is considered malicious.
You must enable Detect Anomalies to configure this option. A blank value disables this option. A value of 0 specifies an unlimited number of bytes.
You can enable rule 123:13 to generate events and, in an inline deployment, drop offending packets for this option.