We are facing the exact Same thing with mx80

iPhone'umdan gönderildi

James Jun <ja...@towardex.com> şunları yazdı (10 Nis 2017 09:14):

> Hello Folks,
>
> We had a strange DoS attack against a customer attached to an MX104 router 
> that caused the device to
> completely stop forwarding all legitimate traffic (routing protocols both igp 
> and bgp timed out across
> all adjacencies and sessions).
>
> The attack traffic was roughly 5.9 Gbps and it was 9.5 million packets per 
> second, mostly mix of tcp
> syn and non-init frags, etc.  It was coming from a single source IP, but 
> targeting random IPv4 addresses
> inside a directly attached customer /23, where many of the destination 
> targets were unused addresses
> on customer's network (no arp entry).
>
> During the event, I saw IPv4-unclassified protocol group getting rate limited 
> by ddos-protection, where
> aggregate policer kicked in at 858k pps:
>
>      Received:  5659052312          Arrival rate:     1 pps
>      Dropped:   5641705949          Max arrival rate: 858556 pps
>
>
> Does the tripping of IPv4-unclassified policer impact any control-plane 
> traffic on the router that may have
> caused it to drop routing protocols?
>
> Aside from arp sponging out unused addresses, are there any best practices 
> for MX routers to better protect
> the device against attacks targeting unused IPs on directly attached subnets? 
>  Given that first gen Trio on
> this box should be able to handle 55 Mpps, it seems like this is odd or 
> ddos-protection is policing
> something that it shouldn't have.  Customer port is 1GE on a 20x1G MIC card 
> behind the QX chip side, but
> we're not doing any queueing on the box.
>
>
> Thanks,
> James
>
> _______________________________________________
> juniper-nsp mailing list juniper-nsp@puck.nether.net
> https://puck.nether.net/mailman/listinfo/juniper-nsp
[SPDNET A.ŞLogo]<https://www.spd.net.tr/>

Cahit Eyügünlü
SPDNET A.Ş
+908508409773
75.Yıl Mahallesi 5301 Sokak No:24/A Yunusemre/MANİSA
[WebsiteGB]<https://www.spd.net.tr/>   [email] 
<mailto:cahit.eyigu...@spd.net.tr>     [Twitter button] 
<hhttps://twitter.com/NetSpd>    [Facebook button] 
<https://www.facebook.com/SpdNetTR/>


Bu e-posta kişiye özel olup, gizli bilgiler içeriyor olabilir. Eğer bu e-posta 
size yanlışlıkla ulaşmışsa, içeriğini hiç bir şekilde kullanmayınız ve ekli 
dosyaları açmayınız. Bu e-posta virüslere karşı anti-virüs sistemleri 
tarafından taranmıştır. Ancak SPDNET, bu e-postanın - virüs koruma sistemleri 
ile kontrol ediliyor olsa bile - virüs içermediğini garanti etmez ve meydana 
gelebilecek zararlardan doğacak hiçbir sorumluluğu kabul etmez.
_______________________________________________
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Reply via email to