See how access layer switches block Network Attacks

Source: Internet
Author: User

The access layer switch has the traffic control function, but it can only limit the speed of all types of traffic passing through the port. The function is not completely functional. Using packet capture tools, I often capture large-volume abnormal packets. On the one hand, they consume network bandwidth, on the other hand, they consume resources of network devices, affecting the normal operation of the network.

Unicast abnormal packets: Most unicast traffic is sent to the Gateway. The gateway device forwards or discards these packets according to the route table. For a private IP address, the unicast traffic is automatically dropped by a vswitch or vro at the public network access layer. If the user has obtained a public IP address, the unicast traffic will be forwarded out, affecting a wider range of networks. Taking the shock wave virus as an example, as long as the infected host detects that the Network is available, it will start an attack propagation thread and generate attack addresses randomly to launch attacks. In the phase of severe shock wave attacks, the network speed slows down significantly. Some access layer switches and some small routers even crash, and the CPU usage of the core layer-3 switch reaches 100%, the operator has to Block ICMP packets.

Broadcast exception packets: broadcast is a necessary way to implement certain protocols. Broadcast packets are sent to all hosts in a specific network segment. Each host processes the received packets and makes a response or discard decision, the result is that both network bandwidth consumption and host performance are affected. By using port isolation technology, you can restrict the transmission of broadcast packets only to upstream ports, which can reduce the impact on the link and host of the local network segment, but cannot solve the impact on the Convergence layer and core layer devices. If multiple sub-divisions are located in one VLAN on the aggregation or core device, the broadcast traffic will be returned to other cells through the upper-layer device, which will continue to occupy the link bandwidth of these cells and affect the host performance, this configuration method is widely used in the current broadband network.

Multicast exception message: the multicast information serves only some users in the network. The destination address is the host applied to join the multicast group in the network. Some hosts do not apply to join multicast groups. These multicast texts should not be forwarded to these hosts, but in fact these hosts still receive multicast information. Why is it that the multicast packets are forwarded to hosts that have not been added? Originally, in order to implement multicast, the L2 Switch uses the GMRP multicast Registration Protocol or the IGMP Snooping protocol to maintain a dynamic multicast table, then, the multicast packets are forwarded to the ports related to the multicast group members to implement layer-2 multicast in the VLAN. If IGMP Snooping is not run, the multicast packets are broadcast on layer-2, this is why multicast flood occurs.

With the popularization of broadband networks and the increasing number of video applications, the multicast technology will be more widely used. At that time, abnormal multicast traffic will not only appear on the second layer of the network, the route is also routed to the whole multicast tree. With the large video traffic, it is difficult to distinguish between normal traffic and abnormal traffic. Therefore, it is more difficult to control multicast.

In short, applications in the LAN may be exploited by viruses. If abnormal traffic is not effectively restricted, the network bandwidth and network devices will consume resources. Therefore, it is particularly important to add intelligence for user-oriented L2 switches and isolate problems within the minimum range.

Countermeasures to resolve risks

With the traffic control function of the access layer switch, we can limit the abnormal traffic flowing through the port to a certain range. For example, the access layer switch has a port-based traffic control function to implement storm control, Port Protection, and port security. Storm Control can reduce the network slowdown caused by unicast, broadcast, Or multicast packets. By setting a threshold value for different types of traffic, the access layer switch enables the traffic control function when the port traffic reaches the set value or even drops the port. Port Protection is similar to port isolation. ports configured with port protection do not exchange any traffic. Port Security imposes port-level access restrictions on unauthorized addresses. Coincidentally, Huawei switches provide port control functions such as traffic control and broadcast storm suppression ratio. The traffic control function is used to notify the other party to temporarily stop sending data packets when the switch and the switch are congested to avoid packet loss. Broadcast storm suppression can limit the size of broadcast traffic and discard broadcast traffic that exceeds the set value.

However, the traffic control function of the access layer switch can only limit the speed of all types of traffic passing through the port, and limit the abnormal traffic of broadcast and multicast to a certain range, however, it is impossible to distinguish between normal traffic and abnormal traffic. It is also difficult to set an appropriate threshold. To further control packets, you can use ACL (Access Control List ). The ACL uses IP addresses and TCP/UDP ports to filter incoming and outgoing packets from the access layer switch. Based on the Preset conditions, the ACL determines whether the packets can be forwarded or blocked. Both Cisco and Huawei vswitches support ip acl and mac acl. Each ACL supports standard and extended formats, respectively. The ACL in the standard format is filtered based on the source address and the upper-layer protocol type. The ACL in the extended format is filtered based on the source address, destination address, and upper-layer protocol type.

By dividing different network traffic segments, you can control abnormal traffic separately. The protocol field of the IP message is used to control abnormal unicast traffic, the protocol field of the Ethernet frame is used to control abnormal broadcast packets, and the multicast packets are used to control the IP address segment. In addition to these control methods, network administrators also need to pay attention to abnormal network traffic, locate the source host with abnormal traffic in time, and eliminate faults.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.