Generalized TTL Security Mechanism (GTSM) defends against attacks by checking the TTL value.
During network attacks, attackers may simulate RIP packets and continuously send them to a router. If the packets are destined for the router, it directly forwards them to the control plane for processing without validating them. As a result, the increased processing workload on the control plane results in high CPU usage. Generalized TTL Security Mechanism (GTSM) defends against attacks by checking whether the time to live (TTL) value in each IP packet header is within a pre-defined range.
The system view is displayed.
GTSM is configured for RIP.
The valid TTL range of the detected packets is [ 255 -valid-ttl-hops-value + 1, 255 ].
The configuration is committed.
GTSM only checks the TTL values of packets that match the GTSM policy. Packets that do not match the GTSM policy can be allowed or dropped.
You can enable the log function to record packet drop for troubleshooting.
Perform the following configurations on the GTSM-enabled router: