Limiting Traceroute
This scenario shows how to set or remove ICMP DDoS protection features for the ICMP Flood attack.
ICMP Disable Limit On Time Exceeded
Description
Effect of disabling an active ICMP DDoS protection for the ICMP Flood attack.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces ethernet eth0 address 10.0.0.2/24 set interfaces ethernet eth1 address 20.0.0.2/24 set system ip icmp rate limit 0 set system ip icmp rate messages-burst 0 set system ip icmp rate messages-per-second 0 set system ip icmp rate type time_exceeded set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Set the following configuration in DUT1
:
set interfaces ethernet eth0 address 10.0.0.1/24 set protocols static route 20.0.0.0/24 next-hop 10.0.0.2 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 3: Set the following configuration in DUT2
:
set interfaces ethernet eth0 address 20.0.0.3/24 set protocols static route 10.0.0.0/24 next-hop 20.0.0.2 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 4: Run command traceroute 20.0.0.3
at DUT1
and check if output matches the following regular expressions:
(1\s+\*\s+\*\s+\*) (20.0.0.3)Show output
traceroute to 20.0.0.3 (20.0.0.3), 30 hops max, 60 byte packets 1 * * * 2 20.0.0.3 0.305 ms 0.298 ms 0.274 ms
Attention
Depending on the architecture of the device after setting messages-burst the previous burst allowance must be spent before changes take effect, by default is set to 50.
Show output
ping 20.0.0.3 count 50 size 1 timeout 1 interval 0.002 ttl 1
Step 5: Modify the following configuration lines in DUT0
:
set system ip icmp rate type none
Step 6: Run command traceroute 20.0.0.3
at DUT1
and check if output matches the following regular expressions:
(10.0.0.2) (20.0.0.3)Show output
traceroute to 20.0.0.3 (20.0.0.3), 30 hops max, 60 byte packets 1 10.0.0.2 0.301 ms 0.278 ms 0.271 ms 2 * * * 3 * * * 4 * * * 5 * * * 6 * * * 7 * 20.0.0.3 1.673 ms 1.599 ms
ICMP Enable Limit On Time Exceeded
Description
Effect of enabling an active ICMP DDoS protection for the ICMP Flood attack.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces ethernet eth0 address 10.0.0.2/24 set interfaces ethernet eth1 address 20.0.0.2/24 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Set the following configuration in DUT1
:
set interfaces ethernet eth0 address 10.0.0.1/24 set protocols static route 20.0.0.0/24 next-hop 10.0.0.2 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 3: Set the following configuration in DUT2
:
set interfaces ethernet eth0 address 20.0.0.3/24 set protocols static route 10.0.0.0/24 next-hop 20.0.0.2 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 4: Run command traceroute 20.0.0.3
at DUT1
and check if output matches the following regular expressions:
(10.0.0.2) (20.0.0.3)Show output
traceroute to 20.0.0.3 (20.0.0.3), 30 hops max, 60 byte packets 1 10.0.0.2 1.072 ms 1.048 ms 1.041 ms 2 20.0.0.3 1.618 ms 1.611 ms 1.605 ms
Step 5: Modify the following configuration lines in DUT0
:
set system ip icmp rate limit 0 set system ip icmp rate messages-burst 0 set system ip icmp rate messages-per-second 0 set system ip icmp rate type time_exceeded
Step 6: Run command traceroute 20.0.0.3
at DUT1
and check if output matches the following regular expressions:
(1\s+\*\s+\*\s+\*) (20.0.0.3)Show output
traceroute to 20.0.0.3 (20.0.0.3), 30 hops max, 60 byte packets 1 * * * 2 20.0.0.3 0.451 ms * *
Attention
Depending on the architecture of the device after setting messages-burst the previous burst allowance must be spent before changes take effect, by default is set to 50.
Show output
ping 20.0.0.3 count 50 size 1 timeout 1 interval 0.002 ttl 1