ThePocketGuide Jan2022
ThePocketGuide Jan2022
January 2022
The Pocket Guide
Glossary 3
Hardware Appliance Overview
➔ TMS-2300 6
➔ TMS-2600 & 2800 7
TMS ➔ TMS-5000 7
➔ TMS-8100 7
➔ HD-1000 8
Mitigation
TMS & APS/AED - FCAP Traffic Filtering 23
TMS & APS/AED - Regular Expression 27
TMS - Packet Header Filtering 29
Other Types - BGP Flow Specification 31
Appendix
AED Countermeasure Sequence 32
Sightline & ArbOS - REST API Matrix 34
Sightline & TMS - BGP Signaling Capabilities 34
Sightline Alert Search Keywords 35
Personal Notes 36
Arbor Cloud Details 39
SP-6000
1 DB-9 serial console port: 9600/8-N-1 5 Ethernet ports (eth1-eth3, top to bottom)
2 VGA connector 6 Ethernet ports (eth4-eth11)
3 Ethernet port (eth0) 7 AC power supply
4 4x USB ports (USB2.0)
SP-7000
SP-Insight 8000
Front Panel: 1
2
Power button and LED
Unit ID button and LED*
5 Remote management LED*
6 Major alarm LED*
3 eth0 activity LED 7 Reset button and LED
4 eth1 activity LED *not supported
TMS-2300
1 DB-9 serial console port: 9600/8-N-1 5 Management Ethernet ports (mgt1-mgt3, top to bottom)
2 VGA connector 6 Ethernet ports (tmsx0 and tmsx1) - Mitigation only
3 Management Ethernet port (mgt0) 7 Ethernet ports (tmsx2 - tmsx5) - Mitigation only
4 4x USB ports (USB2.0) 8 AC power supply
TMS-5000
TMS-8100
1 RJ-45-serial console port - SM0: 9600/8-N-1 5 RJ-45-serial console port -SM1: 9600/8-N-1
2 4x 10GbE ports (tms0.0-tms0.3) SFP+ SR/LR 6 4x 10GbE ports (tms1.0-tms1.3) SFP+ SR/LR
3 4x 10GbE ports (tms0.4.0-tms0.4.3) QSFP+ SR/LR 7 4x 10GbE ports (tms1.4.0-tms1.4.3) QSFP+ SR/LR
with breakout cable with breakout cable
4 1x 1GbE Management Ethernet port (mgt0) 8 1x 1GbE Management Ethernet port (mgt1)
1 RJ-45-serial console port SM-320G-0: 9600/8-N-1 6 RJ-45-serial console port SM-320G-1: 9600/8-N-1
2 1x100 GbE port (tms0.0) QSFP28 (SR4 or LR4) 7 1x100 GbE port (tms1.0) QSFP28 (SR4 or LR4)
3 4x 10GbE ports (tms0.1.0-tms0.1.3) QSFP+ SR4/LR4 8 4x 10GbE ports (tms1.1.0-tms1.1.3) QSFP+
with breakout cable SR4/LR4 with breakout cable
4 1x100 GbE port (tms0.2) QSFP28 (SR4 or LR4) 9 1x100 GbE port (tms1.2) QSFP28 (SR4 or LR4)
5 1x 1GbE Management Ethernet port (mgt0) 10 1x 1GbE Management Ethernet port (mgt1)
DC Power Connection
Mixing PPM-20G and PPM-50G within the same chassis requires the
1500W power supplies and Sightline Release 9.0
Slot1: 10 GbE
One or
Slot2: Not used
two
10 GbE Slot6: 10 GbE
Slot7: Not used
AED-8100
Front-Panel
1 Power button 8 Chassis ID button
2 System reset button 9 NIC1/NIC2 activity LED
3 Chassis information LED 10 HDD activity LED
4 Fan status LED 11 Power alarm LED
5 Critial alarm LED 12 Minor alarm LED
6 Major alarm LED 13 RJ-45 serial console: 115200/8-N-1
7 NMI Button
One
10 GbE Slot1: 1 GbE
+ Slot2: 1 GbE optional
one or Slot6: 10 GbE
two
Slot7: Not used
1 GbE
One
40 GbE Slot1: 10 GbE
+ Slot2: 10 GbE optional
one or Slot6: 40 GbE
two
Slot7: Not used
10 GbE
AED-HD1000
1 RJ-45-serial console port SM-320G-0: 9600/8-N-1 6 RJ-45-serial console port SM-320G-1: 9600/8-N-1
2 1x100 GbE port (ext0) QSFP28 7 1x100 GbE port (ext1) QSFP28
3 4x 10GbE ports (ext2/int2, ext3/int3) QSFP+ with 8 4x 10GbE ports (ext4/int4, ext5/int5) QSFP+ with
breakout cable breakout cable
4 1x100 GbE port (int0) QSFP28 9 1x100 GbE port (int1) QSFP28
5 1x 1GbE Management Ethernet port (mgt0) 10 1x 1GbE Management Ethernet port (mgt1)
TRA/DS
Leader
TMS
Global System
UI
/ help global or help or ? see available command sub options - ✓ ✓ ✓
/ users list all CLI connected users on appliance - ✓ ✓ ✓
/ clock show or set the system clock - ✓ ✓ ✓
/ config show show the running configuration - ✓ ✓ ✓
/ config write or revert save or revert current configuration - ✓ ✓ ✓
/ config clear clear config on TMS to restart ZTP process (≥ 8.2) - - - ✓
/ config rcs diff|history|show show Configuration Commit History (≤9.2) ✓ - - -
Remote Access
/ ip access show show active and inactive IP access rules - ✓ ✓ ✓
add IP access rule for remote access by protocol, ingress -
/ ip access add proto int source-ip interface and source IP address or range. ✓ ✓ ✓
proto: cloudsignaling, bgp, https, ssh, ping, snmp, ssh, ...
/ ip access delete proto int source-ip delete an IP access rule - ✓ ✓ ✓
/ ip access commit commit inactive IP access rules. (config write to persist reboot) - ✓ ✓ ✓
System Initialization
configure device as a leader
ip: own management IPv4
/ services sp bootstrap leader ip secret role ✓ - - -
secret: shared zone secret
role: PI, CP
configure device as a non-leader (≤ 9.0.2)
ip: is the IPv4 address of the leader
/ services sp bootstrap non-leader ip secret role - ✓ ✓ -
secret: shared zone secret
role: PI, BI or CP
configure device as a non-leader (≥ 9.0.2)
ip: is the IPv4 address of the leader
/ services sp bootstrap non-leader ip own-ip
own-ip: is the IPv4 address of this device - ✓ ✓ -
secret role
secret: shared zone secret
role: PI, BI, CP or AC* *(≥9.4.0.0)
configure TMS
/ services tms bootstrap ip secret ip: is the IPv4 address of the leader - - - ✓
secret: shared zone secret
IP + Interface Configuration and Verification
/ ip arp show show ARP entries (management interfaces only) - ✓ ✓ ✓
/ ip route show show IP routing configuration - ✓ ✓ ✓
/ ip interface show [brief] show network interface configuration. - ✓ ✓ ✓
/ ip interface counter int [clear] show or clear interface counters - - - ✓
/ ip interfaces ring_rx_buf_size intf rx-buf-size configure interface rx buffer size (≥ 9.0) - ✓ ✓ -
/ ip interfaces ifconfig int ip/M state configure interface ip address/mask & interface state (≥ 9.2) - ✓ ✓ ✓
/ ip interfaces ifconfig int dhcp enable|disable enable or disable dhcp on management interface - ✓ ✓ ✓
/ ip interface show sfp show SFP details, also on TMS (≥ 9.4.0.0) - ✓ ✓ ✓
/ system hardware sfp show SFP details (< 9.4.0.0) - - - ✓
/ system hardware interface name pluggable- show SFP and SFP+ details (≥ 9.1 and < 9.4.0.0) -
- - ✓
module-info
/ system hardware interface name pause-frames show interface pause frames settings (≥ 9.1) - - - ✓
/ system hardware interface name dump-regs Dump all registers from interface hardware (≥ 9.1) - - - ✓
/ system hardware 10g-mgmt show/enable/dis. flip 10G interfaces from mitigation to management (≥9.3) - - - ✓
CLI System Configuration Commands
/ system banner set configure a banner for console and SSH connections - ✓ ✓ ✓
/ system name set hostname configure device name - ✓ ✓ ✓
/ system idle set seconds configure idle timeout for console and SSH connections - ✓ ✓ ✓
Troubleshooting
/ traceroute, traceroute6 trace route to IPv4 / IPv6 host through MGT interfaces - ✓ ✓ ✓
/ ping, ping6 ping a IPv4 / IPv6 host through MGT interfaces - ✓ ✓ ✓
/ ip interface snoop interface filter watch traffic on local interface. filter: PCAP expression - ✓ ✓ ✓
create diagnostics package. Please provide in case of a -
/ system diagnostics ✓ ✓ ✓
support ticket with ATAC.
/ system disk show see the disk utilization and the RAID status - ✓ ✓ ✓
/ system disk expand expand disk size, only supported for sda4 file systems - ✓ ✓ -
/ services logging view syslog options view system internal syslog messages - ✓ ✓ ✓
/ services logging export syslog dst copy syslog logging file to local disk or scp destination (≥ 9.2) - ✓ ✓ -
/ services logging remote set host prot port send syslog messages to remote host via tcp|udp (≥ 9.2) - ✓ ✓ ✓
/ services sp iprep classification show show AIF Threat Indicator details (≥9.3) ✓ - - -
/ services sp data database resync resync the global database between UI devices, the Sightline - ✓ - -
service must be stopped (≥ 8.2)
/ services sp analyze pcap disk:file generate RegEX expression from uploaded pcap file (≥ 9.2) ✓ - - -
/ services sp deployment [disk:filename] gather deployment overview, output can also be written to file
✓ - - -
on internal flash-disk.
/ services sp data flow view int ip records view flow information received through an interface.
ip: all or IP-Address of one router ✓ - - -
records: all records or first record only
/ services sp data snmp view ip comm oid test SNMPv2 query towards router
ip: address of the router
✓ - - -
comm: snmp community
oid: specific OID, else use ‘system’
/ services sp alerts system_errors show show configured handling of system errors detected ✓ - - -
generate a test notification
type: email, email_xml, snmp, syslog,
/ services sp notification test type destination ✓ - - -
webhook (≥ 9.2)
destination: default or an explicit group
/ services sp backup failover activate switch manually to a backup leader - ✓ - -
/ services sp portal soap age set days threshold when SOAP log entries will be auto deleted ✓ - - -
/ services sp portal login_page clear custom login page to be set back to default ✓ ✓ - -
/ services sp device edit name arf set on|off enable or disable ARF (fcap matching) binning ✓ - - -
/ services sp device zone_secret show see the configured zone secret in clear text (hidden
✓ ✓ ✓ -
commands command)
/ services sp mitigation tms learning end_all stop all running learning mitigations ✓ - - -
/ services sp mitigation tms stop name stop a running mitigation by it’s name ✓ - - -
/ services sp certificate show check validity period of installed certificate ✓ - - -
/ reload reboot the appliance ✓ ✓ ✓ ✓
/ reload [hard] reboot the TMS appliance, [hard] = with full power cycle - - - ✓
/ services tms firmware upgrade start firmware upgrade (≤ 9.1) - - - ✓
/ system hardware firmware start firmware upgrade (≥ 9.2) - - - ✓
/ services tms tms-ping ipv4|ipv6 addr intf ping from a mitigation interface with src interface - - - ✓
/ services tms tms-traceroute ipv4|ipv6 addr intf traceroute from a mitigation interface with src interface - - - ✓
Filter Elements
[src|dst] (host|net) <address> matches a host as IP source, destination or either address
[src|dst] <address>/<mask> matches a host as IP source, destination or either address
(proto|protocol) <name> matches IP protocol by name
(proto|protocol) <number> matches IP protocol by number
(proto|protocol) <number>..<number> matches IP protocol by a range of numbers
[src|dst] port <name> matches TCP or UDP packets send to/from or either by name
[src|dst] port <number> matches TCP or UDP packets send to/from or either by number
[src|dst] port <number>..<number> matches TCP or UDP packets send to/from or either by range
(tflags|tcpflags) <tcp-flags> matches TCP packet on included TCP Flags
(bytes|bpp) <size> matches packet equal to length
(bytes|bpp) <size>..<size> matches packet within range of length
icmptype <icmptype> matches ICMP packets based on message type
icmpcode <number> matches ICMP packets based on message code
tos <value> matches IP packets based on Type of Service setting
ttl <value> matches IP packets based on their included TTL value
frag matches IP packets that are fragments
(not|!) (proto|port|bpp|icmp…) negate adjacent element. Not supported for IP addresses
[and|or] often used with brackets to nest individual expressions
All examples provided should first be tested in inactive mode, even if they are
normally used without further constraints. However, it is possible that your valid
traffic requires adjustments to prevent over blocking.
Filter Examples
drop 0.0.0.0/0 discard all traffic
drop proto udp and not dst port 53 discard all UDP except for dst port 53
drop src host 10.1.1.1 and dst 192.168.2.1/32 discard traffic from host 10.1.1.1 toward host 192.168.2.1
drop not (proto icmp or proto tcp) discard all IP protocols except ICMP and TCP
discard all ICMP packets with a size between 200 and 2000
drop proto icmp and bytes 200..2000
bytes
drop proto tcp and not (src port 1024..65535 and (dst port 80 or dst discard all TCP except when the source port is within 1024
port 443)) to 65535 and the destination port is either 80 or 443
discard ICMP except for “fragmentation needed and DF set”
drop proto icmp and not ((icmptype 3 and icmpcode 4) or
used by Path MTU Discovery and “Fragment Reassembly
(icmptype 11 and icmpcode 1))
Time Exceeded”
drop proto udp and port 123 and not bpp 76 discard NTP packets that are not 76 bytes (NTP Response)
discard TCP except when source port is within 1024 to
drop proto tcp and not ((src port 1024..65535 and dst port 25) or 65535 and the destination is 25 or when the source port is
(src port 25 and dst port 1024..65535)) 25 and the destination is within 1024 to 65535, therefore
allowing inbound and outbound SMTP connections.
drop proto tcp and dst port 80 and tflags S/S discard TCP packet when the SYN flag is present
drop proto tcp and dst port 80 and tflags /S discard TCP packet when the SYN flag is not present
drop proto tcp and dst port 80 and tflags S/SAFRPUEW discard TCP packet when the SYN flag is the only flag set
Example: Web Server (HTTP and HTTPS)
drop not (proto icmp or proto tcp)
drop proto tcp and not ((src port 1024..65535 and dst port 80) or (src port 1024..65535 and dst port 443))
drop proto icmp and not ((icmptype 3 and icmpcode 4) or (icmptype 11 and icmpcode 1))
Example: Authoritative DNS server
drop not (proto icmp or proto udp or proto tcp)
drop proto tcp and not ((src port 53 or src port 1024..65535) and dst port 53)
drop proto udp and not ((src port 53 or src port 1024..65535) and dst port 53)
drop proto icmp and not ((icmptype 3 and icmpcode 4) or (icmptype 11 and icmpcode 1))
Example: Recursive DNS server
drop not (proto icmp or proto udp or proto tcp)
drop proto tcp and not ((src port 1024..65535 and dst port 53) or (src port 53 and dst port 1024..65535))
drop proto udp and not ((src port 1024..65535 and dst port 53) or (src port 53 and dst port 1024..65535))
drop proto icmp and not ((icmptype 3 and icmpcode 4) or (icmptype 11 and icmpcode 1))
Example: SMTP MTA
drop not (proto icmp or proto tcp)
drop proto tcp and not ((src port 1024..65535 and dst port 25) or (src port 25 and dst port 1024..65535))
drop proto icmp and not ((icmptype 3 and icmpcode 4) or (icmptype 11 and icmpcode 1))
# drop your own prefixes if these are not expected to be seen coming via the internet
drop src net [your own prefix(es)]
# drop traffic normally not used via the internet, stop scanning…
drop proto tcp and dst port 23
drop proto tcp and dst port 445
# drop DNS queries, if there is no DNS service running on the protected host!
drop proto udp and dst port 53 !
# drop DNS replies, if there is no external DNS resolution done by the protected host!
drop proto udp and src port 53
!
Mitigate Fragmented Attack Traffic – Fragments reported as src and dst port 0
The TMS reassembles fragmented packets if they are complete sets before evaluating them against
active countermeasures. However, UDP amplification attacks causing congestion are likely to result
in complete sets. After reassembling a packet from a complete set of fragments, the TMS identifies
the source and destination ports and displays them in the sample packets window.
The Sample Packets Shown section shows actually a UDP packet with a size of 15000 bytes, which was
initially broken into 10 fragments (assuming a MTU of 1500 bytes). It also highlights that the packet
was actually forwarded.
The frag keyword match fragmented packets to be reassembled, with can be used in an FCAP
expression like the one below entered into the Black/White (Deny/Allow) Lists countermeasure.
If the mentioned FCAP filter is applied, we can now see that the previously forwarded traffic is now
dropped by the TMS.
Filter Elements
IP Filters ICMP Filters TCP Filters UDP Filters
ip icmp tcp udp
ip.hdr_len icmp.checksum tcp.option_kind udp.checksum
ip.len icmp.code tcp.checksum udp.dstport
ip.version icmp.type tcp.dstport udp.length
ip.addr + (IP or CIDR) tcp.flags udp.port
ip.dsfield tcp.flags.{ack|push|reset|syn|fin|cwr|ecn|ns|urg} udp.srcport
ip.dsfield.{dscp|ecn} tcp.hdr_len
ip.dst + (IP or CIDR) tcp.options.{sack_perm|mss_val}
ip.flags tcp.port
ip.flags.{df|rb} tcp.srcport
ip.proto tcp.window_size_value
ip.src + (IP or CIDR)
ip.ttl
Example
tcp.window_size_value > 10000 and TCP window size is greater than 10.000 and TCP selective
tcp.options.sack_perm && tcp.options.mss_val ge 1450 acknowledgement is enabled and TCP MSS value is greater
and not tcp.port & 1 than or equal to 1450 bytes and the TCP port (bitwise verified)
is not 1, aka is not ‘an uneven port number’.
Release ≥9.5.0.0
The syntax in the Packet Header Filtering countermeasure for the ip.flags field has changed. The new
syntax matches the syntax that Wireshark uses. Although the ip.flags field is a 3-bit field, Wireshark treats
it as a full byte. The Packet Header Filtering countermeasure previously treated ip.flags as a 3-bit field, but
now also treats it as a full byte.
TCP Header
UDP Header
ICMP Header
Sightline Mitigation
To filter using the destination prefix, type the destination CIDR block
to match. Only one CIDR block is allowed in this field.
To filter using the source prefix, type the source CIDR block to
match. Only one CIDR block is allowed in this field.
To filter using the source port, type the source port number or range
to match. Example: 32768-49151,49159-65535
To filter using the destination port, type the destination port number
or range to match. Example: 80
To filter using the ICMP type or code, type the ICMP type or code
values or ranges in the appropriate fields: Example: 3,16-255
To filter using TCP flags, type the TCP flag numbers to match. The
common flag numbers are 1=fin, 2=syn, 4=rst, 8=psh, 16=ack,
32=urg, 64=ece, and 128=cwr. Example: 18 (SYN/ACK)
The Sightline REST API output is in the JSON API format. The responses use return links to refer to
other resources and support pagination. When you make a request to the REST API, you can
specify which API version to use., to use the version 3 alerts endpoint:
https://sightline.example.com/api/sp/v3/alerts/
If a request contains no version information, it defaults to the latest version. In most cases, the
Sightline REST API keeps the full functionality of still-supported previous versions. However, there
could be a situation where an older endpoint provides only partial functionality or is removed
entirely. More information can be found in the Arbor Sightline and TMS API Guide for the used
software release.
Personal Notes:
Personal Notes:
Personal Notes:
Contacts
CORPORATE HEADQUARTER
NETSCOUT
310 Littleton Road
Westford, MA 01886-4105, USA
+1 978-614-4000 SCAN ME
+1 888-357-7667 (Toll-free)
[email protected]
www.NETSCOUT.com/arbor-ddos
Arbor Cloud
+1 844-END-DDoS| +1 734-794-5099
Portal: https://config.arborcloud.netscout.com/
mail: [email protected]
Stay up-to-date
3.2201.01