BGP4+ GTSM must be configured on both peers.
The GTSM prevents attacks through TTL detection. An attacker simulates real BGP4+ packets and sends the packets in a large quantity to the router. After receiving the packets, an interface board of the router directly sends the packets to the BGP4+ module of the control plane if the interface board finds that the packets are sent by the local router, without checking the validity of the packets. The control plane of the router needs to process the "legal" packets. As a result, the system becomes abnormally busy and the CPU usage is high.
The GTSM protects the router by checking whether the TTL value in an IP packet header is within a pre-defined range to enhance the system security.
Before configuring the BGP4+ GTSM, complete the following task:
Perform the following steps on both BGP4+ peers:
GTSM only checks the TTL values of packets that match the GTSM policy. Packets that do not match the GTSM policy can be allowed or dropped. If "drop" is set as the default GTSM action for packets, you need to configure TTL values for all the packets sent from valid peers in the GTSM policy. If TTL values are not configured for the packets sent from a peer, the device will discard the packets sent from the peer and cannot establish a connection to the peer. Therefore, GTSM enhances security but reduces the ease of use.
You can enable the log function to record packet drop for troubleshooting.
Perform the following configurations on the GTSM-enabled router:
Run the following command to check the previous configurations.
Run the display gtsm statistics { slot-id | all } command to check the statistics about the GTSM.
In VS mode, this command is supported only by the admin VS.