[GTER] IX-SP - OSPF (89)
André Carlim
andre at stubnet.info
Mon Dec 12 10:20:08 -02 2016
Eu também estou recebendo pacotinhos OSPFv2 desse cidadão, ele não
poderia ter OSPF ativado na interface dele.
---
Atenciosamente,
André Carlim
StubNetwork
Em 2016-12-12 01:49, Kivio Braga escreveu:
> Srs,
>
>
> Seria normal tipo de protocolo (89) OSPFv2 ficar vagando na
> vlan do ATM IPv4 do IX-SP ?
>
> kivio at XXXX-MX80-IXSP# run monitor traffic interface ae1.XXXX size 1500
> no-resolve detail matching "ip proto 89"
>
> Address resolution is OFF.
> Listening on ae1.XXXX, capture size 1500 bytes
>
> 01:22:56.642733 In IP (tos 0xc0, ttl 1, id 12322, offset 0, flags
> [none], proto: OSPF (89), length: 64) 187.16.223.84 > 224.0.0.5:
> OSPFv2,
> Hello, length 44
> Router-ID 172.24.0.1, Backbone Area, Authentication Type: none (0)
> Options [External]
> Hello Timer 10s, Dead Timer 40s, Mask 255.255.248.0, Priority 1
> Designated Router 187.16.223.84
>
> 01:23:06.667047 In IP (tos 0xc0, ttl 1, id 12755, offset 0, flags
> [none], proto: OSPF (89), length: 64) 187.16.223.84 > 224.0.0.5:
> OSPFv2,
> Hello, length 44
> Router-ID 172.24.0.1, Backbone Area, Authentication Type: none (0)
> Options [External]
> Hello Timer 10s, Dead Timer 40s, Mask 255.255.248.0, Priority 1
> Designated Router 187.16.223.84
>
>
> Estou questionando... por que além de capturar este tipo de pacote
> dentro
> IX-SP.. estou sofrendo com proteção de uma caixa da Juniper,
> aparentemente
> ela esta recebendo umas pancadas... Estou procurando um norte a seguir,
> e
> acabei batendo nesta situação:
>
> run show ddos-protection protocols ospf
> statistics
> Packet types: 1, Received traffic: 1, Currently violated: 1
>
> Protocol Group: OSPF
>
> Packet type: aggregate
> System-wide information:
> Aggregate bandwidth is being violated!
> No. of FPCs currently receiving excess traffic: 1
> No. of FPCs that have received excess traffic: 1
> Violation first detected at: 2016-12-12 01:29:22 BRST
> Violation last seen at: 2016-12-12 01:34:28 BRST
> Duration of violation: 00:05:06 Number of violations: 1725
> Received: 1575865 Arrival rate: 0 pps
> Dropped: 1222164 Max arrival rate: 57387 pps
>
>
> jddosd[1725]: DDOS_PROTOCOL_VIOLATION_CLEAR: INFO: Host-bound traffic
> for
> protocol/exception OSPF:aggregate has returned to normal. Its allowed
> bandwith was exceeded at fpc 0 for 409 times, from 2016-12-12 01:41:03
> BRST
> to 2016-12-12 01:41:12 BRST
>
>
>
> --
> Kívio Fernandes Braga
> --
> gter list https://eng.registro.br/mailman/listinfo/gter
More information about the gter
mailing list