Got it

PBR

Created: Sep 29, 2020 13:00:52Latest reply: Sep 29, 2020 13:01:16 299 1 0 0 0
  Rewarded HiCoins: 0 (problem resolved)

Hello everyone,

The USG6620 is connected to an S7706 through a GE electrical interface. The USG6620 connects to the municipal office through an uplink GE optical interface, and the S7706 connects to the subordinate offices in the downstream direction.

Traffic from the extranet to the network segment corresponding to the server is diverted to the DDoS through BGP on the USG6620. The DDoS traffic is injected back to the USG6620 through PBR. After receiving the traffic, the USG6620 diverts the traffic to the intranet through PBR.

                                             

1

The configurations on the USG6620 are as follows:

bgp 100

 peer 10.10.100.18 as-number 100

 #

 ipv4-family unicast

  undo synchronization

  peer 10.10.100.18 enable

#

policy-based-route

 rule name DDos-YinLiu/HuiZhu

  ingress-interface GigabitEthernet1/0/7

  action pbr egress-interface GigabitEthernet1/0/5 next-hop 10.10.100.70

The AntiDDoS configuration is as follows:

bgp 100

 peer 10.10.100.17 as-number 100

 #

 ipv4-family unicast

  undo synchronization

  import-route unr

  peer 10.10.100.17 enable

  peer 10.10.100.17 route-policy 1 export

  peer 10.10.100.17 advertise-community

#

policy-based-route

 rule name huizhu

  ingress-interface GigabitEthernet1/0/6

  action pbr egress-interface GigabitEthernet1/0/7 next-hop 10.10.100.21

However, after the test, the policy-based routing redirection of the USG6620 does not take effect, and the extranet traffic cannot be diverted to the server after passing through the AntiDDoS.

Please help me! Thank you!


Featured Answers
DDSN
Admin Created Sep 29, 2020 13:01:16

Hi Qazik,
The session table matching mechanism of the firewall takes precedence over the policy-based routing and routing tables. If a data packet has been generated in a session table and the quintuples are the same, the firewall forwards the data packet based on the session table instead of querying the policy-based routing and routing table. If the data matches the previous session quintuple, the data is forwarded based on the session table, and the policy-based routing does not take effect. The data is sent in a loop between the USG6620 and AntiDDoS until the TTL reaches 0.
Change the networking mode and configure AntiDDoS traffic diversion and injection on the S7706 to prevent the firewall session table from being preferentially matched.
Configure the S7706 as follows:
acl number 3000
rule 0 permit ip destination 10.139.195.0 0.0.0.255
#
traffic classifier DDos operator or precedence 5
if-match acl 3000
#
traffic behavior DDos
permit
redirect ip-nexthop 10.10.100.18
#
traffic policy DDos match-order config
classifier DDos behavior DDos
interface Vlanif129
traffic-policy DDos inbound
I hope it helps!
View more
  • x
  • convention:

All Answers
DDSN
DDSN Admin Created Sep 29, 2020 13:01:16

Hi Qazik,
The session table matching mechanism of the firewall takes precedence over the policy-based routing and routing tables. If a data packet has been generated in a session table and the quintuples are the same, the firewall forwards the data packet based on the session table instead of querying the policy-based routing and routing table. If the data matches the previous session quintuple, the data is forwarded based on the session table, and the policy-based routing does not take effect. The data is sent in a loop between the USG6620 and AntiDDoS until the TTL reaches 0.
Change the networking mode and configure AntiDDoS traffic diversion and injection on the S7706 to prevent the firewall session table from being preferentially matched.
Configure the S7706 as follows:
acl number 3000
rule 0 permit ip destination 10.139.195.0 0.0.0.255
#
traffic classifier DDos operator or precedence 5
if-match acl 3000
#
traffic behavior DDos
permit
redirect ip-nexthop 10.10.100.18
#
traffic policy DDos match-order config
classifier DDos behavior DDos
interface Vlanif129
traffic-policy DDos inbound
I hope it helps!
View more
  • x
  • convention:

Comment

You need to log in to comment to the post Login | Register
Comment

Notice: To protect the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but are not limited to the following:
  • Politically sensitive content
  • Content concerning pornography, gambling, and drug abuse
  • Content that may disclose or infringe upon others ' commercial secrets, intellectual properties, including trade marks, copyrights, and patents, and personal privacy
Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see " User Agreement."

My Followers

Login and enjoy all the member benefits

Login

Block
Are you sure to block this user?
Users on your blacklist cannot comment on your post,cannot mention you, cannot send you private messages.
Reminder
Please bind your phone number to obtain invitation bonus.