Brocade Communications Systems ServerIron ADX 12.4.00 Service Manual Page 99

  • Download
  • Add to my manuals
  • Print
  • Page
    / 149
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 98
ServerIron ADX NAT64 Configuration Guide 87
53-1002444-02
Enabling ACL filtering of fragmented packets
5
DRAFT: BROCADE CONFIDENTIAL
You can protect against fragment flooding by specifying the maximum number of fragments the
device or an individual interface is allowed to send to the CPU in a one-second interval. If the device
or an interface receives more than the specified number of fragments in a one-second interval, the
device either drops or forwards subsequent fragments in hardware, depending on the action you
specify. In addition, the device starts a holddown timer and continues to either drop or forward
fragments until the holddown time expires.
The device also generates a syslog message.
To specify the maximum fragment rate per second, enter commands such as the following.
The first command sets the fragment threshold at 15,000 per second, for the entire device. If the
device receives more than 15,000 packet fragments in a one-second interval, the device takes the
specified action. The action specified with this command is to drop the excess fragments and
continue dropping fragments for a holddown time of ten minutes. After the ten minutes have
passed, the device starts sending fragments to the CPU again for processing.
The second command sets the fragment threshold at 5,000 for individual interfaces. If any
interface on the device receives more than 5,000 fragments in a one-second interval, the device
takes the specified action. In this case, the action is to forward the fragments in hardware without
filtering them. The device continues forwarding fragments in hardware for five minutes before
beginning to send fragments to the CPU again.
Both thresholds apply to the entire device. Thus, if an individual interface’s fragment threshold is
exceeded, the drop or forward action and the holddown time apply to all fragments received by the
device.
Syntax: [no] ip access-list frag-rate-on-sys <num> exceed-action deny | forward reset-interval
<mins>
and
Syntax: [no] ip access-list frag-rate-on-interface <num> exceed-action drop | forward reset-interval
<mins>
The <num> parameter specifies the maximum number of fragments the device or an individual
interface can receive and send to the CPU in a one-second interval.
frag-rate-on-sys: Sets the threshold for the entire device. The device can send to the CPU only
the number of fragments you specify per second, regardless of which interfaces the fragments
come in on. If the threshold is exceeded, the device takes the exceed action you specify.
frag-rate-on-interface: Sets the threshold for individual interfaces. If an individual interface
receives more than the specified maximum number of fragments, the device takes the exceed
action you specify.
The <num> parameter specifies the maximum number of fragments per second.
For frag-rate-on-system, you can specify from 600 through 12800. The default is 6400.
For frag-rate-on-interface, you can specify from 300 through 8000. The default is 4000.
The drop | forward parameter specifies the action to take if the threshold (<num> parameter) is
exceeded:
drop: Fragments are dropped without filtering by the ACLs
ServerIronADX(config)# ip access-list frag-rate-on-sys 15000 exceed-action deny
reset-interval 10
ServerIronADX(config)#ip access-list frag-rate-on-interface 5000 exceed-action
forward reset-interval 5
Page view 98
1 2 ... 94 95 96 97 98 99 100 101 102 103 104 ... 148 149

Comments to this Manuals

No comments