Using Traffic Monitor Graphs : Using the Anomaly Drops graphs : Using the Anomaly Drops Layer 4 Header Anomalies graph
 
Using the Anomaly Drops Layer 4 Header Anomalies graph
You use the Layer 4 Header Anomalies graph to monitor drops due to suspicious Layer 4 headers. Layer 4 anomalies are typically generated by scripts. Scripts use loops to increment specific header parameters. Since many of these header parameter values are not valid from a standards perspective, they are anomalous. Examples of these attacks are packets with invalid TCP flag combinations. If a packet has flags such as RST, FIN, SYN, and ACK set simultaneously, it is anomalous.
Table 47 summarizes the statistics displayed in the Layer 4 Header Anomalies graph. Figure 60 shows the graph.
You can customize the following query terms: SPP, period, direction.
Before you begin:
You must have Read-Write permission for Log & Report settings.
To display the graphs:
Go to Monitor > Anomaly Drops > Layer 4 Header Anomalies.
Table 47: Anomaly Drops: Layer 4 Header Anomalies
Statistic
Description
TCP Checksum Error
Drops due to checksum errors.
UDP Checksum Error
Drops due to checksum errors.
ICMP Checksum Error
Drops due to checksum errors.
TCP Invalid Flag Combination
Drops due to invalid flag combinations, such as SYN/RST.
Anomaly Detected
Drops due to Layer 4 anomalies, including:
Other header anomalies, such as incomplete packet
Urgent flag is set then the urgent pointer must be non-zero
SYN or FIN or RST is set for fragmented packets
Data offset is less than 5 for a TCP packet
End of packet is detected before the 20 bytes of TCP header
EOP before the data offset indicated data offset
Length field in Window scale option other than 3 in a TCP packet
Missing UDP payload
Missing ICMP payload
 
Figure 60: Anomaly Drops: Layer 4 Header Anomalies