Allied Telesis Layer 3 Switches manual Using QoS policy-based storm protection

Page 5

Using QoS policy-based storm protection

Policy-based storm protection lets you specify one of a range of actions for the switch to take when it detects a broadcast storm. It is a part of the QoS functionality.

Policy-based storm protection is more powerful than simple bandwidth limiting. It lets you restrict storm damage to within the storming VLAN, and it gives you the flexibility to define what traffic rate makes a broadcast storm.

Configuration To use storm protection:

Protecting the network

Products

AT-8948

x900-48 Series

AT-9900 Series

AT-9924Ts

x900-24 Series

Software Versions

2.8.1 and later

1.Turn on the switch enhanced mode qoscounters, unless it is already enabled. After this, you need to restart the switch.

2.Create a classifier to match the desired traffic. To match all broadcast packets specify a destination MAC address of ff-ff-ff-ff-ff-ff.

3.Create a QoS traffic class and define the following storm protection settings in it:

z Window (stormwindow) specifies how often the switch measures traffic to decide whether to activate storm protection (in seconds).

z Rate (stormrate) specifies the amount of traffic per second that must be exceeded before the switch takes action.

z Action (stormaction) specifies what the switch does when it detects a storm: Link Down (linkdown) makes the switch physically disable the port on which the storm is occurring, so that the link goes down.

Port Disable (portdisable) makes the switch logically disable the port on which the storm is occurring, leaving the link up.

VLAN Disable (vlandisable) makes the switch block traffic only on the VLAN on which the storm is occurring.

z Timeout (stormtimeout) specifies the number of seconds that the port remains disabled for.

4.Create the rest of the QoS framework: a flow group and policy. Add the classifier to the flow group, the flow group to the traffic class, and the traffic class to the policy.

5.Apply the policy—and therefore the storm protection—to one or more ports.

The procedure above applies storm protection to classified traffic, and uses a classifier to select all broadcast traffic. This is the most common approach. If you want to, you can instead classify to select important non-broadcast traffic and apply storm protection to unmatched traffic. Unimportant or unwanted unicast and multicast traffic then counts towards the storm calculations.

To apply storm protection to unclassified traffic, configure storm protection on the default traffic class in the QoS policy settings. Use the parameters dtcstormwindow, dtcstormrate, dtcstormaction, and dtcstormtimeout.

Create A Secure Network With Allied Telesis Managed Layer 3 Switches

5

Image 5
Contents Introduction ContentsEdge switch Access Router Protecting against packet flooding Securing the deviceProtecting the network Bandwidth limiting Configuration To use storm protection Using QoS policy-based storm protectionRest of the QoS configuration is as normal, so Reboot after turning on enhanced modeConfiguration on one or more ports Protecting against rapid MAC movementIgmp snooping Controlling multicast trafficIgmp throttling Configuration For each portIgmp filtering Managing the device securely Using Secure Shell SSHConfiguration Configuration 1. Enable Snmp Using SSL for secure web accessUsing SNMPv3 Managing the device securely Building a whitelist through layer 3 filters Whitelisting telnet hostsBuilding a whitelist through QoS Trouble with ARP Identifying the userIP spoofing and tracking Dhcp snooping Rejecting Gratuitous ARP GarpUsing static binding for rigid control Setting up Dhcp snoopingUsing ARP security Using 802.1x port authenticationUsing Dhcp snooping to track clients Protecting the user Using private VLANsTo remove ports from the Vlan Using local proxy ARP and MAC-forced forwardingLocal proxy ARP Configuration of access router Example Add ip int=vlan104 ip=address-in-192.168.4.0-subnet MAC-Forced Forwarding Macff Switches Using IPsec to make VPNsAccess EdgeBlocking worms through classifier-based filters Protecting against wormsBlocking worms through QoS actions Edge switch 1 is directly connected to the access router Edge switchEdge switch Add ip int=vlan500 ip=172.16.5.103 mask=255.255.255.0 Access Router C613-16103-00 REV a