Cpu-Defend Policy For Network v1.1
Cpu-Defend Policy For Network v1.1
Cpu-Defend Policy For Network v1.1
4.
5.
6.
7.
the ARP entry exists, this packet will encapsulated with mac then
forwarded directly; if this ARP not exist, equipment will generates one ARP
Miss notify ARP module to send ARP request.
ARP MISS attack just make use of this weakness, generate lots of packet
with DIP not exist, the Router have to generate lots of ARP Miss
notifications when failure in finding arp entry. Too much arp-miss cause
the high CPU usage.
HUAWEI highly suggest to lower this value depend on real network
requirement.
Recommend value: 500kbps ,(convert to 1000pps, based on min frame
size 64bytes)
Prevent SNMP attack
In the common network, SNMP is used to transfer manage information
between NM station and agent, SNMP protocol packets must be processed
by CPU of the LPU board. In reality, this will incur SNMP attack, our CPU
can handle 2Ms SNMP packet during idle time, but in real scenario, CPU
need process many protocol at same time. If SNMP process occupies CPU
for too long time, it will lead to other critical processes can not be
scheduled.
HUAWEI highly suggest to lower this value depend on real network
requirement.
Recommend value: 500kbps.
Prevent BGP/LDP/OSPF attack
In the common network, route protocol(such as BGP/LDP/OSPF) is used to
advice communicate route between routers, these protocol packets must
be processed by CPU of the LPU board. In reality, this will incur route
protocol attack, our CPU can handle these packets during idle time, but in
real scenario, CPU need process many protocol at same time. If some one
protocol process occupies CPU for too long time, it will lead to other critical
processes can not be scheduled.
HUAWEI highly suggest to protect these important route protocols depend
on real network requirement.
Recommend : Use advanced ACL to protect important routing
protocols,such as BGP/LDP/OSPF.
Prevent DHCP attack
In the common network, DHCP is used to obtain IP address dynamic by
hosts. But DHCP packets must be processed by CPU of the LPU board. In
reality, this will incur DHCP attack, our CPU can handle 2Ms DHCP packets
during idle time, but in real scenario, CPU need process many protocol at
same time. If DHCP process occupies CPU for too long time, it will lead to
other critical processes can not be scheduled.
Recommend value: 500kbps .(this value must be evaluated carefully
depend on real network requirement)
Prevent HWTACAS attack
Index
ID
Item
Default
Value(kbps)
Recommended
Valuekbps
12
ICMP
4000
100
39
2000
100
47
2000
100
50
ARP_MISS(FIB_MISS)
2000
500
SNMP packet
2000
500
BGP packet
4000
200
LDP packet
4000
200
OSPF packet
4000
200
17
DHCP packet
2000
500
21
HWTACACS packet
1000
200
22
4000
100
23
IGMP packet
3000
200
26
VRRP packet
3000
1000
HOW TO:
1. Use advanced ACL to protect BGP protocol
[NE40E-X8]display bgp peer
BGP local router ID : 121.121.121.121
Local AS number : 100
Total number of peers : 4
Peers in established state : 3
Peer
V
AS MsgRcvd MsgSent OutQ Up/Down State PrefRcv
116.116.116.116 4
100
266
300
0 03:47:46 Established
12
[NE40E-X8-acl-adv-3001display this
acl number 3001
rule 5 permit tcp source 116.116.116.116 0 destination-port eq bgp
rule 10 permit tcp source 116.116.116.116 0 source-port eq bgp
2. Use advanced ACL to protect LDP protocol
[NE40E-X8]display mpls ldp adjacency verbose
LDP Adjacency Information
-----------------------------------------------------------------------------LDP Peer ID : 116.116.116.116
VPNInstance name : CreateDate : 2001-03-17
CreateTime : 16:37:50
Adjacency Age : 0000:04:14
AdjacencyType : Local Adjacency
Discovery-Source : GigabitEthernet1/1/0
Attack-Type
Total-Packets
Passed-Packets
Packets-------------------------------------------------------------------------------6
Application-Apperceive
156815352
98922813
-------------------------------------------------------------------------------FTP SERVER
SSH SERVER
SNMP
TELNET SERVER
TFTP
0
0
0
0
0
0
BGP
LDP
RSVP
57892539
Dropped-
OSPF
0
0
RIP
11
11
ISIS
ICMP
206
MSDP
PIM
206
0
2112
LACP
28931
NTP
97678306
0
0
LSPPING
1210527
RRPP
VRRP
2761
1210527
0
2216
0
0
FTP CLIENT
545
0
802.1AG
MPLSOAM
57891981
28931
0
HWTACACS
BFD
2112
155570287
RADIUS
DHCP
IGMP
TELNET CLIENT
515
502
13
SSH CLIENT
DNS CLIENT
-------------------------------------------------------------------------------6
MA-Defend
-------------------------------------------------------------------------------FTP
SSH
SNMP
TELNET
TFTP
BGP
LDP
RSVP
OSPF
RIP
-------------------------------------------------------------------------------6
URPF
-------------------------------------------------------------------------------6
Tcpip-defend
-------------------------------------------------------------------------------Abnormal-packet
Fragment-packet
Tcpsyn-packet
Udp-packet
--------------------------------------------------------------------------------