Limiting Traceroute

This scenario shows how to set or remove ICMP DDoS protection features for the ICMP Flood attack.

../../../../../_images/threeifcs.svg

ICMP Disable Limit On Time Exceeded

Description

Effect of disabling an active ICMP DDoS protection for the ICMP Flood attack.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.0.0.2/24
set interfaces ethernet eth1 address 20.0.0.2/24
set system ip icmp rate limit 0
set system ip icmp rate messages-burst 0
set system ip icmp rate messages-per-second 0
set system ip icmp rate type time_exceeded
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 10.0.0.1/24
set protocols static route 20.0.0.0/24 next-hop 10.0.0.2
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 3: Set the following configuration in DUT2 :

set interfaces ethernet eth0 address 20.0.0.3/24
set protocols static route 10.0.0.0/24 next-hop 20.0.0.2
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 4: Run command traceroute 20.0.0.3 at DUT1 and check if output matches the following regular expressions:

(1\s+\*\s+\*\s+\*)
(20.0.0.3)
Show output
traceroute to 20.0.0.3 (20.0.0.3), 30 hops max, 60 byte packets
 1  * * *
 2  20.0.0.3  0.481 ms  0.472 ms  0.463 ms

Attention

Depending on the architecture of the device after setting messages-burst the previous burst allowance must be spent before changes take effect, by default is set to 50.

Show output
ping 20.0.0.3 count 50 size 1 timeout 1 interval 0.002 ttl 1

Step 5: Modify the following configuration lines in DUT0 :

set system ip icmp rate type none

Attention

Depending on the architecture of the device after setting messages-burst the previous burst allowance must be spent before changes take effect, by default is set to 50.

Show output
ping 20.0.0.3 count 50 size 1 timeout 1 interval 0.002 ttl 1

Step 6: Run command traceroute 20.0.0.3 at DUT1 and check if output matches the following regular expressions:

(10.0.0.2)
(20.0.0.3)
Show output
traceroute to 20.0.0.3 (20.0.0.3), 30 hops max, 60 byte packets
 1  10.0.0.2  0.227 ms  0.196 ms  0.187 ms
 2  * * *
 3  * * *
 4  * * *
 5  * * *
 6  * * *
 7  * 20.0.0.3  0.752 ms  0.720 ms

ICMP Enable Limit On Time Exceeded

Description

Effect of enabling an active ICMP DDoS protection for the ICMP Flood attack.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.0.0.2/24
set interfaces ethernet eth1 address 20.0.0.2/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 10.0.0.1/24
set protocols static route 20.0.0.0/24 next-hop 10.0.0.2
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 3: Set the following configuration in DUT2 :

set interfaces ethernet eth0 address 20.0.0.3/24
set protocols static route 10.0.0.0/24 next-hop 20.0.0.2
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Attention

Depending on the architecture of the device after setting messages-burst the previous burst allowance must be spent before changes take effect, by default is set to 50.

Show output
ping 20.0.0.3 count 50 size 1 timeout 1 interval 0.002 ttl 1

Step 4: Run command traceroute 20.0.0.3 at DUT1 and check if output matches the following regular expressions:

(10.0.0.2)
(20.0.0.3)
Show output
traceroute to 20.0.0.3 (20.0.0.3), 30 hops max, 60 byte packets
 1  10.0.0.2  0.352 ms  0.316 ms  0.327 ms
 2  20.0.0.3  0.685 ms  0.678 ms  0.670 ms

Step 5: Modify the following configuration lines in DUT0 :

set system ip icmp rate limit 0
set system ip icmp rate messages-burst 0
set system ip icmp rate messages-per-second 0
set system ip icmp rate type time_exceeded

Step 6: Run command traceroute 20.0.0.3 at DUT1 and check if output matches the following regular expressions:

(1\s+\*\s+\*\s+\*)
(20.0.0.3)
Show output
traceroute to 20.0.0.3 (20.0.0.3), 30 hops max, 60 byte packets
 1  * * *
 2  20.0.0.3  0.449 ms  0.439 ms *

Attention

Depending on the architecture of the device after setting messages-burst the previous burst allowance must be spent before changes take effect, by default is set to 50.

Show output
ping 20.0.0.3 count 50 size 1 timeout 1 interval 0.002 ttl 1