DEFEND/4/hwBaseSecurityTcpIpAttackDiscardedRateRising_active

Message

DEFEND/4/hwBaseSecurityTcpIpAttackDiscardedRateRising_active: Security TCP-IP drop packets alarmed. (ChassisID=[ChassisID], SlotID=[SlotID], Type=[Type], CurrentRateLow=[CurrentRateLow], CurrentRateHigh=[CurrentRateHigh], NotifyEnabled=[NotifyEnabled], RateThreshold=[RateThreshold], RateInterval=[RateInterval], ProtocolDescription=[ProtocolDescription], Reason=[Reason])

In VS mode, this log is supported only by the admin VS.

Description

The number of discarded TCP/IP protocol packets exceeded the alarm threshold.

Parameters

Parameter Name Parameter Meaning

ChassisID

Indicates a chassis ID.

SlotID

Indicates the slot number of an interface board.

Type

Indicates a traffic model. The values are as follows:

1: TCP malformed packet

2: UDP flooding packet

3: TCPSYN packet

4: Fragmented packet

CurrentRateLow

Rightmost 32 bits of statistics about dropped packets.

CurrentRateHigh

Leftmost 32 bits of statistics about dropped packets.

NotifyEnabled

Indicates whether the trap function is enabled.

1: Enabled

2: Disabled

RateThreshold

Indicates the threshold of a current alarm.

RateInterval

Indicates the interval of a current alarm.

ProtocolDescription

Indicates the description of protocol.

Reason

Indicates the cause of the alarm.

Possible Causes

TCPIP related traffic's discarded rate exceeded alarm threshold.

Procedure

1. Run the display cpu-defend tcpip-defend statistics slot slot-id command to check the information about the interface board protocol CIR and CBS. Check the values of Actual CIR in NP and Actual CBS in NP.

  • If the configured protocol rate is too low to meet the requirements for service operation, run the car command to increase the rate. After 60 seconds, check whether the alarm is cleared. If the alarm is not cleared, go to Step 2.
  • If the configured protocol rate meets the requirements for service operation but the alarm is still not cleared, go to Step 2.

2. Run the display cpu-defend policy policy-number command to check the alarm configuration of Application apperceive Configuration. Check whether the protocol configurations of alarm threshold or alarm interval are reasonable.

  • If the alarm threshold is too low, run the alarm drop-rate command to increase the threshold value according to the traffic volume. Check whether the alarm is cleared. If the alarm is not cleared, go to Step 3.
  • If the alarm interval is too short, run the alarm drop-rate command to increase the interval. Check whether the alarm is cleared. If the alarm is not cleared, go to Step 3.

3. Run the display attack-source-trace slot slot-id original-information command to check the Attack Source Data. Check the header information cached in the attack source tracing module.

  • If the packet source IP address or the target IP address does not fall within the service scope, configure attack defense policies to filter the traffic. For specific configurations, see "Configuration of Local Attack Defense". Check whether the alarm is cleared. If the alarm is not cleared, go to Step 4.
  • If the source IP address and the target IP address of the packet meet the service requirements but the alarm is still not cleared, go to Step 4.

4. Collect the alarm information, log information, and configuration information, and then contact technical support personnel.

5. End.

Copyright © Huawei Technologies Co., Ltd.
Copyright © Huawei Technologies Co., Ltd.
< Previous topic Next topic >