< Home

Defense Against DHCP Flooding Attacks

Attack Behavior

When a switch functioning as a DHCP server or relay agent receives a large number of DHCP packets sent by a malicious user, the switch cannot process valid DHCP packets. As a result, clients cannot obtain or renew IP addresses.

Security Policy

To defend against the preceding attack, configure the following security policies on a switch:
  • DHCP port-level protection

    The switch monitors the DHCP packet rate based on ports. When the rate of DHCP packets sent to the control plane from a port exceeds the specified threshold, the switch sends these DHCP packets to the control plane through an independent channel. This avoids impact on valid DHCP packets.

  • DHCP user-level protection

    The switch monitors the rate of DHCP packets sent to the control plane based on users (MAC or IP addresses). When the rate of DHCP packets from a user exceeds the specified threshold, the switch discards this user's DHCP packets for a certain period of time.

Some low-end fixed switches do not support DHCP port-level or user-level protection. On switches that support the two functions, DHCP port-level protection is enabled by default, and DHCP user-level protection needs to be enabled manually.

Configuration Method

Configure DHCP user-level protection based on users' MAC or IP addresses. To prevent valid addresses from being filtered out, remove valid DHCP server addresses from the attack source tracing whitelist.

<HUAWEI> system-view
[HUAWEI] cpu-defend policy antiatk
[HUAWEI-cpu-defend-policy-antiatk] auto-defend enable
[HUAWEI-cpu-defend-policy-antiatk] auto-defend threshold 30
[HUAWEI-cpu-defend-policy-antiatk] auto-defend attack-packet sample 5
[HUAWEI-cpu-defend-policy-antiatk] undo auto-defend trace-type source-portvlan
[HUAWEI-cpu-defend-policy-antiatk] undo auto-defend protocol tcp telnet ttl-expired igmp icmp dhcpv6 mld nd
[HUAWEI-cpu-defend-policy-antiatk] auto-defend action deny timer 300
[HUAWEI-cpu-defend-policy-antiatk] auto-defend whitelist 1 interface gigabitethernet 1/0/1 //Add the uplink or network-side interface to the whitelist.
[HUAWEI-cpu-defend-policy-antiatk] auto-defend whitelist 2 interface gigabitethernet 2/0/0 //Add the uplink or network-side interface to the whitelist.
[HUAWEI-cpu-defend-policy-antiatk] quit
[HUAWEI] cpu-defend-policy antiatk  //Apply the attack defense policy to the main control board.
[HUAWEI] cpu-defend-policy antiatk global  //Apply the attack defense policy to all interface boards or the switch.
Copyright © Huawei Technologies Co., Ltd.
Copyright © Huawei Technologies Co., Ltd.
< Previous topic