Limiting Traceroute
This scenario shows how to set or remove ICMP DDoS protection features for the ICMP Flood attack.
ICMP Disable Limit On Time Exceeded
Description
Effect of disabling an active ICMP DDoS protection for the ICMP Flood attack.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces ethernet eth0 address 10.0.0.2/24 set interfaces ethernet eth1 address 20.0.0.2/24 set system ip icmp rate limit 0 set system ip icmp rate messages-burst 0 set system ip icmp rate messages-per-second 0 set system ip icmp rate type time_exceeded set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Set the following configuration in DUT1
:
set interfaces ethernet eth0 address 10.0.0.1/24 set protocols static route 20.0.0.0/24 next-hop 10.0.0.2 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 3: Set the following configuration in DUT2
:
set interfaces ethernet eth0 address 20.0.0.3/24 set protocols static route 10.0.0.0/24 next-hop 20.0.0.2 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 4: Run command traceroute 20.0.0.3
at DUT1
and check if output matches the following regular expressions:
(1\s+\*\s+\*\s+\*) (20.0.0.3)Show output
traceroute to 20.0.0.3 (20.0.0.3), 30 hops max, 60 byte packets 1 * * * 2 20.0.0.3 0.573 ms 0.562 ms 0.554 ms
Attention
Depending on the architecture of the device after setting messages-burst the previous burst allowance must be spent before changes take effect, by default is set to 50.
Show output
ping 20.0.0.3 count 50 size 1 timeout 1 interval 0.002 ttl 1
Step 5: Modify the following configuration lines in DUT0
:
set system ip icmp rate type none
Attention
Depending on the architecture of the device after setting messages-burst the previous burst allowance must be spent before changes take effect, by default is set to 50.
Show output
ping 20.0.0.3 count 50 size 1 timeout 1 interval 0.002 ttl 1
Step 6: Run command traceroute 20.0.0.3
at DUT1
and check if output matches the following regular expressions:
(10.0.0.2) (20.0.0.3)Show output
traceroute to 20.0.0.3 (20.0.0.3), 30 hops max, 60 byte packets 1 10.0.0.2 0.268 ms 0.237 ms 0.249 ms 2 * * * 3 * * * 4 * * * 5 * * * 6 * * * 7 * 20.0.0.3 0.416 ms 0.385 ms
ICMP Enable Limit On Time Exceeded
Description
Effect of enabling an active ICMP DDoS protection for the ICMP Flood attack.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces ethernet eth0 address 10.0.0.2/24 set interfaces ethernet eth1 address 20.0.0.2/24 set system ip icmp rate type none set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Set the following configuration in DUT1
:
set interfaces ethernet eth0 address 10.0.0.1/24 set protocols static route 20.0.0.0/24 next-hop 10.0.0.2 set system ip icmp rate type none set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 3: Set the following configuration in DUT2
:
set interfaces ethernet eth0 address 20.0.0.3/24 set protocols static route 10.0.0.0/24 next-hop 20.0.0.2 set system ip icmp rate type none set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 4: Ping IP address 20.0.0.3
from DUT1
:
admin@DUT1$ ping 20.0.0.3 count 1 size 56 timeout 1Show output
PING 20.0.0.3 (20.0.0.3) 56(84) bytes of data. 64 bytes from 20.0.0.3: icmp_seq=1 ttl=63 time=0.533 ms --- 20.0.0.3 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.533/0.533/0.533/0.000 ms
Attention
Depending on the architecture of the device after setting messages-burst the previous burst allowance must be spent before changes take effect, by default is set to 50.
Show output
ping 20.0.0.3 count 50 size 1 timeout 1 interval 0.002 ttl 1
Step 5: Run command traceroute 20.0.0.3
at DUT1
and check if output matches the following regular expressions:
(10.0.0.2) (20.0.0.3)Show output
traceroute to 20.0.0.3 (20.0.0.3), 30 hops max, 60 byte packets 1 10.0.0.2 0.243 ms 0.214 ms 0.230 ms 2 20.0.0.3 0.516 ms 0.506 ms 0.497 ms
Step 6: Modify the following configuration lines in DUT0
:
set system ip icmp rate limit 0 set system ip icmp rate messages-burst 0 set system ip icmp rate messages-per-second 0 set system ip icmp rate type time_exceeded
Step 7: Run command traceroute 20.0.0.3
at DUT1
and check if output matches the following regular expressions:
(1\s+\*\s+\*\s+\*) (20.0.0.3)Show output
traceroute to 20.0.0.3 (20.0.0.3), 30 hops max, 60 byte packets 1 * * * 2 20.0.0.3 0.408 ms 0.444 ms 0.435 ms
Attention
Depending on the architecture of the device after setting messages-burst the previous burst allowance must be spent before changes take effect, by default is set to 50.
Show output
ping 20.0.0.3 count 50 size 1 timeout 1 interval 0.002 ttl 1