Got it

How to configure the CPU defending policy of S5700?

Latest reply: Apr 1, 2017 09:16:15 3519 1 0 0 0

Hello, Community!


This post enquires about the procedure of how to configure the CPU Defending Policy of S5700. Please see more details below.


Huawei S5720


ISSUE DESCRIPTION


One day, the CPU of the switch rose instantly and caused the interruption of the network. Via the traffic log, we found out that there was an ICMP DOS attack to the switch, which caused the instant increase of the CPU of the switch CPU. 


The customer wants us to solve this problem so that when another DOS attack is detected, it would affect the whole network.


So please assist me with the procedure of how to configure the CPU defending policy of S5700. Thanks!

  • x
  • convention:

ms.america
Created Apr 1, 2017 09:16:15

CPU defending feature is added to S5720 to handle DOS attack. 

cpu-defend policy io-board         // creates an attack defense policy and displays the attack defense policy view.
 auto-defend enable       //
 enable automatic attack source tracing.
 auto-defend attack-packet sample 5     //
 sets the packet sampling ratio for attack source tracing. The value is an integer that ranges from 1 to 1024.
 auto-defend threshold 30           //
 sets the checking threshold for attack source tracing. The value is an integer that ranges from 1 to 65535, in pps.

auto-port-defend aging-time     // configures the aging time for port attack defense. The value is an integer that ranges from 30 to 86400, and must be a multiple of 10. The unit is second.                

 undo auto-defend trace-type source-portvlan  // deletes an attack source tracing mode.
 undo auto-defend protocol xx         //
 By default, the device traces sources of 8021X, ARP, DHCP, ICMP, IGMP, TCP, Telnet in attack source tracing. You can choice which you need.
 auto-defend action deny             //
 Discards packets sent from an attack source.

 auto-defend whitelist 1 interface GigabitEthernet x/x/x                //uplink port add to whitelist

auto-defend whitelist 2 interface GigabitEthernet x/x/x //uplink port add to whitelist
cpu-defend-policy io-board global           //
 the attack defense policy is applied to the device

View more
  • x
  • convention:

Comment

You need to log in to comment to the post Login | Register
Comment

Notice: To protect the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but are not limited to the following:
  • Politically sensitive content
  • Content concerning pornography, gambling, and drug abuse
  • Content that may disclose or infringe upon others ' commercial secrets, intellectual properties, including trade marks, copyrights, and patents, and personal privacy
Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see " Privacy."

My Followers

Login and enjoy all the member benefits

Login

Block
Are you sure to block this user?
Users on your blacklist cannot comment on your post,cannot mention you, cannot send you private messages.
Reminder
Please bind your phone number to obtain invitation bonus.