Education - Australia / New Zealand

 View Only
last person joined: 22 days ago 

A local community of education customers across Australia / NZ. This group will be moderated by HPE Aruba Networking staff and kept up to date with any upcoming training or events that are relevant to the EDU space.
Expand all | Collapse all

Protecting the Switch Control Plane

This thread has been viewed 17 times
  • 1.  Protecting the Switch Control Plane

    Posted May 26, 2018 03:02 AM

    Real World Example

    I had an interesting discussion with a customer just recently. They are an educational institution, with a decent size network of mostly ProCurve switches. The core switches are the 8200zl chassis - precursor to the current 5400R.

     

    They had been having problems with the network, characterised by slowdowns, sluggish performance and slow or unresponsive CLI. It was intermittent in incidence and duration. They had logged a call, but there was nothing of consequence in the logs and monitoring was difficult because of the inconsistent nature of the issue.

     

    As we discussed what was going on, it became clear that these symptoms only occurred during teaching hours. That pointed to an external problem source, possibly on a student device. In the past, I have come across all of these on client devices:

    • mismatched network chipset/driver
    • faulty network interface
    • misconfigured network settings
    • virus/malware

    I talked about some of the lesser-known features in the switch such as virus throttling or control plane protection that may help alleviate the symptoms enough to enable better on-switch diagnostics.

     

    About a week later, the customer reported that with better access to the CLI, they were able to run diagnostics (such as mirror port to a WireShark PC) that enabled them to determine the cause. It turned out that “several” miscreants were running ping-flood denial of service (DOS) programs. It wasn’t clear if this was a coordinated DOS, or multiple independent actors, nor was it clear what the motivation was. The story ends at “disciplinary action”...

     

    Control Plane Protection

    Control Plane Protection has been around since about 15.04, although it doesn't appear to be referenced in the manuals. It works on many of the older ProCurve switches, and is recommended as part of switch hardening. CoPP would be a better option where it is available. CoPP is mutually exclusive with control-plane-protection.

     

    control-plane-protection enable

    Control Plane Policing (CoPP)

    Control Plane Policing sets rate limit on control protocols to protect CPU overload from DOS attacks

    COPP - what does it do.png

    This supersedes Control Plane Protection, and is only available in code from 16.04 onwards (which excludes some of the older switches such as the 8200zl or 5400zlV1). CoPP is much more configurable, and you can also write custom classes.

    copp traffic-class all limit default


    CoPP Example

    I was able to replicate the ping flood DOS enough to illustrate the example. The switch in use is a 5406R.


    Before CoPP is enabled

    Core(config)# show cpu
    
    1 sec ave: 42 percent busy
    5 sec ave: 42 percent busy
    1 min ave: 23 percent busy


    After Copp is enabled

    Core(config)# show cpu
    
    5 percent busy, from 4 sec ago
    1 sec ave: 7 percent busy
    5 sec ave: 5 percent busy
    1 min ave: 7 percent busy
    
    Core(config)# show copp status
    
     Traffic-Class                  CoPP Status Threshold Ex Rx Violate Pkts
     ------------------------------ ----------- ------------ ----------------------
     station-arp                    Enabled     No
     station-icmp                   Enabled     Yes          98041
     station-ip                     Enabled     No
     ip-gateway-control             Enabled     No
     ospf                           Enabled     No
     bgp                            Enabled     No
     rip                            Enabled     No
     multicast-route-control        Enabled     No
     loop-ctrl-mstp                 Enabled     No
     loop-ctrl-pvst                 Enabled     No
     loop-ctrl-loop-protect         Enabled     No
     loop-ctrl-smart-links          Enabled     No
     layer2-control-others          Enabled     No
     udld-control                   Enabled     No
     sampling                       Enabled     No
     icmp-redirect                  Enabled     Yes
     unicast-sw-forward             Enabled     No
     multicast-sw-forward           Enabled     No
     mac-notification               Enabled     No
     exception-notification         Enabled     No
     broadcast                      Enabled     No
     unclassified                   Enabled     No


    Rather than seeing a continuous stream of pings, the flow is slowed down and broken up:
    COPP - ping results.png
     Syslog also shows CoPP entries now.COPP - syslog entries.png



  • 2.  RE: Protecting the Switch Control Plane

    Posted Jul 29, 2019 10:13 AM

    Hi,

    I know this post is over a year old, but it is still relevant.


    Is there any documentation as to what each default traffic class includes?


    Are these limits for the entire switch, IP address or switch-port?


    Is CoPP hardware or software based. Will it increase CPU usage when enabled?

     

    Thank you



  • 3.  RE: Protecting the Switch Control Plane

    EMPLOYEE
    Posted Oct 15, 2019 02:37 PM

    Yes - Google Aruba COPP <switch family> and you will see the COPP guides. Those guides have an example of the default COPP settings.

    The COPP policy is global, and the CX switches have to have a COPP policy applied (comes with default already applied), so CPU is OK with COPP.

    Of course when COPP is in action it is actually protecting the CPU.