Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

Navigation
Guide That Contains This Content
[+] Expand All
[-] Collapse All

    Example: Configuring Unicast RPF on an EX Series Switch

    Unicast reverse-path forwarding (RPF) helps protect the switch against denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks by verifying the unicast source address of each packet that arrives on an ingress interface where unicast RPF is enabled.

    This example shows how to help defend the switch ingress interfaces against denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks by configuring unicast reverse-path forwarding (RPF) on a customer-edge interface to filter incoming traffic:

    Requirements

    This example uses the following software and hardware components:

    • Junos OS Release 10.1 or later for EX Series switches
    • Two EX8200 switches

    Before you begin, be sure you have:

    • Connected the two switches by symmetrically routed interfaces.
    • Ensured that the interface on which you will configure unicast RPF is symmetrically routed.

    Overview and Topology

    Large amounts of unauthorized traffic such as attempts to flood a network with fake (bogus) service requests in a denial-of-service (DoS) attack can consume network resources and deny service to legitimate users. One way to help prevent DoS and distributed denial-of-service (DDoS) attacks is to verify that incoming traffic originates from legitimate network sources.

    Unicast RPF helps ensure that a traffic source is legitimate (authorized) by comparing the source address of each packet that arrives on an interface to the forwarding-table entry for its source address. If the switch uses the same interface that the packet arrived on to reply to the packet's source, this verifies that the packet originated from an authorized source, and the switch forwards the packet. If the switch does not use the same interface that the packet arrived on to reply to the packet's source, the packet might have originated from an unauthorized source, and the switch discards the packet.

    This example uses two EX8200 switches. On EX3200 and EX4200 switches, you cannot configure individual interfaces for unicast RPF. On EX3200 and EX4200 switches, the switch applies unicast RPF globally to all interfaces on the switch. See Understanding Unicast RPF for EX Series Switches for more information on limitations regarding the configuration of unicast RPF on EX3200 and EX4200 switches.

    In this example, an enterprise network's system administrator wants to protect Switch A against potential DoS and DDoS attacks from the Internet. The administrator configures unicast RPF on interface ge-1/0/10 on Switch A. Packets arriving on interface ge-1/0/10 on Switch A from the Switch B source also use incoming interface ge-1/0/10 as the best return path to send packets back to the source.

    The topology of this configuration example uses two EX8200 switches, Switch A and Switch B, connected by symmetrically routed interfaces:

    • Switch A is on the edge of an enterprise network. The interface ge-1/0/10 on Switch A connects to the interface ge-1/0/5 on Switch B.
    • Switch B is on the edge of the service provider network that connects the enterprise network to the Internet.

    Configuration

    To enable unicast RPF, perform these tasks:

    CLI Quick Configuration

    To quickly configure unicast RPF on Switch A, copy the following command and paste it into the switch terminal window:

    [edit interfaces]
    set ge-1/0/10 unit 0 family inet rpf-check

    Step-by-Step Procedure

    To configure unicast RPF on Switch A:

    1. Enable unicast RPF on interface ge-1/0/10:
      [edit interfaces]
      user@switch# set ge-1/0/10 unit 0 family inet rpf-check

    Results

    Check the results:

    [edit interfaces]user@switch# showge-1/0/10 {unit 0 {family inet {rpf-check;}}}

    Verification

    To confirm that the configuration is correct, perform these tasks:

    Verifying That Unicast RPF Is Enabled on the Switch

    Purpose

    Verify that unicast RPF is enabled.

    Action

    Verify that unicast RPF is enabled on interface ge-1/0/10 by using the show interfaces ge-1/0/10 extensive or show interfaces ge-1/0/10 detail command.

    user@switch> show interfaces ge-1/0/10 extensive
    Physical interface: ge-1/0/10, Enabled, Physical link is Down
      Interface index: 139, SNMP ifIndex: 58, Generation: 140
      Link-level type: Ethernet, MTU: 1514, Speed: Auto, MAC-REWRITE Error: None,
      Loopback: Disabled, Source filtering: Disabled, Flow control: Enabled,
      Auto-negotiation: Enabled, Remote fault: Online
      Device flags   : Present Running
      Interface flags: Hardware-Down SNMP-Traps Internal: 0x0
      Link flags     : None
      CoS queues     : 8 supported, 8 maximum usable queues
      Hold-times     : Up 0 ms, Down 0 ms
      Current address: 00:19:e2:50:95:ab, Hardware address: 00:19:e2:50:95:ab
      Last flapped   : Never
      Statistics last cleared: Never
      Traffic statistics:
       Input  bytes  :                    0                    0 bps
       Output bytes  :                    0                    0 bps
       Input  packets:                    0                    0 pps
       Output packets:                    0                    0 pps
       IPv6 transit statistics:
        Input  bytes  :                   0
        Output bytes  :                   0
        Input  packets:                   0
        Output packets:                   0
      Input errors:
        Errors: 0, Drops: 0, Framing errors: 0, Runts: 0, Policed discards: 0,
        L3 incompletes: 0, L2 channel errors: 0, L2 mismatch timeouts: 0,
        FIFO errors: 0, Resource errors: 0
      Output errors:
        Carrier transitions: 0, Errors: 0, Drops: 0, Collisions: 0, Aged packets: 0,
        FIFO errors: 0, HS link CRC errors: 0, MTU errors: 0, Resource errors: 0
      Egress queues: 8 supported, 4 in use
      Queue counters:       Queued packets  Transmitted packets      Dropped packets
        0 best-effort                    0                    0                    0
        1 assured-forw                   0                    0                    0
        5 expedited-fo                   0                    0                    0
        7 network-cont                   0                    0                    0
      Active alarms  : LINK
      Active defects : LINK
      MAC statistics:                      Receive         Transmit
        Total octets                             0                0
        Total packets                            0                0
        Unicast packets                          0                0
        Broadcast packets                        0                0
        Multicast packets                        0                0
        CRC/Align errors                         0                0
        FIFO errors                              0                0
        MAC control frames                       0                0
        MAC pause frames                         0                0
        Oversized frames                         0
        Jabber frames                            0
        Fragment frames                          0
        VLAN tagged frames                       0
        Code violations                          0
      Filter statistics:
        Input packet count                       0
        Input packet rejects                     0
        Input DA rejects                         0
        Input SA rejects                         0
        Output packet count                                       0
        Output packet pad count                                   0
        Output packet error count                                 0
        CAM destination filters: 0, CAM source filters: 0
      Autonegotiation information:
        Negotiation status: Incomplete
      Packet Forwarding Engine configuration:
        Destination slot: 1
    
      Logical interface ge-1/0/10.0 (Index 69) (SNMP ifIndex 59) (Generation 135)
        Flags: Device-Down SNMP-Traps 0x0 Encapsulation: ENET2
        Traffic statistics:
         Input  bytes  :                    0
         Output bytes  :                    0
         Input  packets:                    0
         Output packets:                    0
         IPv6 transit statistics:
          Input  bytes  :                   0
          Output bytes  :                   0
          Input  packets:                   0
          Output packets:                   0
        Local statistics:
         Input  bytes  :                    0
         Output bytes  :                    0
         Input  packets:                    0
         Output packets:                    0
        Transit statistics:
         Input  bytes  :                    0                    0 bps
         Output bytes  :                    0                    0 bps
         Input  packets:                    0                    0 pps
         Output packets:                    0                    0 pps
         IPv6 transit statistics:
          Input  bytes  :                   0
          Output bytes  :                   0
          Input  packets:                   0
          Output packets:                   0
            Protocol inet, Generation: 144, Route table: 0
          Flags: uRPF                
          Addresses, Flags: Is-Preferred Is-Primary 
    

    Meaning

    The second-to-last line of the display shows the unicast RPF flag enabled, confirming that unicast RPF is enabled on interface ge-1/0/10.

    Published: 2012-12-07