Page 611 / 757 Scroll up to view Page 606 - 610
xStack
®
DGS-3600 Series Layer 3 Gigabit Ethernet Managed Switch CLI Manual
607
79
SAFEGUARD ENGINE COMMANDS
Periodically, malicious hosts on the network will attack the Switch by utilizing packet flooding (ARP Storm) or other
methods. These attacks may increase the CPU utilization beyond its capability. To alleviate this problem, the Safeguard
Engine function was added to the Switch’s software.
The Safeguard Engine can help the overall operability of the Switch by minimizing the workload of the Switch while the
attack is ongoing, thus making it capable to forward essential packets over its network in a limited bandwidth. When the
Switch either (a) receives too many packets to process or (b) exerts too much memory, it will enter an Exhausted mode.
When in this mode, the Switch will perform the following tasks to minimize the CPU usage:
It will limit bandwidth of receiving ARP packets. The user may implement this in two ways, by using the
config
safeguard_engine
command.
o
When strict is chosen, the Switch will stop receiving ARP packets not destined for the Switch. This will
eliminate all unnecessary ARP packets while allowing the essential ARP packets to pass through to the
Switch’s CPU.
o
When fuzzy is chosen, the Switch will minimize the ARP packet bandwidth received by the switch by
adjusting the bandwidth for all ARP packets, whether destined for the Switch or not. The Switch uses an
internal algorithm to filter ARP packets through, with a higher percentage set aside for ARP packets
destined for the Switch.
It will limit the bandwidth of IP packets received by the Switch. The user may implement this in two ways, by
using the
config safeguard_engine
command.
o
When strict is chosen, the Switch will stop receiving all unnecessary broadcast IP packets, even if the
high CPU utilization is not caused by the high reception rate of broadcast IP packets.
o
When fuzz
y
is chosen, the Switch will minimize the IP packet bandwidth received by the Switch by
adjusting the bandwidth for all IP packets, by setting a acceptable bandwidth for both unicast and
broadcast IP packets. The Switch uses an internal algorithm to filter IP packets through while adjusting
the bandwidth dynamically.
IP packets may also be limited by the Switch by configuring only certain IP addresses to be accepted. This method can
be accomplished through the CPU Interface Filtering mechanism explained in the previous section. Once the user
configures these acceptable IP addresses, other packets containing different IP addresses will be dropped by the Switch,
thus limiting the bandwidth of IP packets. To keep the process moving fast, be sure not to add many conditions on which
to accept these acceptable IP addresses and their packets, this limiting the CPU utilization.
Once in Exhausted mode, the packet flow will decrease by half of the level that caused the Switch to enter Exhausted
mode. After the packet flow has stabilized, the rate will initially increase by 25% and then return to a normal packet flow.
NOTICE:
When the Safeguard Engine is enabled, the Switch will allot bandwidth to various traffic
flows (ARP, IP) using the FFP (Fast Filter Processor) metering table to control the CPU utilization and
limit traffic. This may limit the speed of routing traffic over the network.
The Safeguard Engine commands in the Command Line Interface (CLI) are listed (along with the appropriate parameters)
in the following table.
Command
Parameters
config safeguard_engine
{state [enable | disable] | utilization {rising <value 20-100> | falling <value 20-
100>} | trap_log [enable | disable] | mode [strict | fuzzy]}
show safeguard_engine
Each command is listed, in detail, in the following sections.
Page 612 / 757
xStack
®
DGS-3600 Series Layer 3 Gigabit Ethernet Managed Switch CLI Manual
608
config safeguard_engine
Purpose
To config ARP storm control for system.
Syntax
config safeguard_engine {state [enable | disable] | utilization {rising <value 20-
100> | falling <value 20-100>} | trap_log [enable | disable] | mode [strict | fuzzy]}
Description
Use this command to configure Safeguard Engine to minimize the effects of an ARP
storm.
Parameters
state [enable | disable]
– Select the running state of the Safeguard Engine function as
enable or disable.
utilization
– Select this option to trigger the Safeguard Engine function to enable based
on the following determinates:
rising <value 20-100>
– The user can set a percentage value of the rising CPU
utilization which will trigger the Safeguard Engine function. Once the CPU
utilization rises to this percentage, the Safeguard Engine mechanism will
initiate.
falling <value 20-100>
– The user can set a percentage value of the falling
CPU utilization which will trigger the Safeguard Engine function to cease. Once
the CPU utilization falls to this percentage, the Safeguard Engine mechanism
will shut down.
trap_log [enable | disable]
– Choose whether to enable or disable the sending of
messages to the device’s SNMP agent and switch log once the Safeguard Engine has
been activated by a high CPU utilization rate.
mode
- Used to select the type of Safeguard Engine to be activated by the Switch when
the CPU utilization reaches a high rate. The user may select:
strict
– If selected, this function will stop accepting all ARP packets not
intended for the Switch, and will stop receiving all unnecessary broadcast IP
packets, until the storm has subsided.
fuzzy
– If selected, this function will instruct the Switch to minimize the IP and
ARP traffic flow to the CPU by dynamically allotting an even bandwidth to all
traffic flows.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example usage:
To configure the safeguard engine for the Switch:
DGS-3627:admin# config safeguard_engine state enable utilization rising 45
Command: config safeguard_engine state enable utilization rising 45
Success.
DGS-3627:admin#
show safeguard_engine
Purpose
Used to display current Safeguard Engine settings.
Syntax
show safeguard_engine
Description
This will list the current status and type of the Safeguard Engine settings currently
configured.
Parameters
None.
Restrictions
None.
Example usage:
Page 613 / 757
xStack
®
DGS-3600 Series Layer 3 Gigabit Ethernet Managed Switch CLI Manual
609
To display the safeguard engine status:
DGS-3627:admin# show safeguard_engine
Command: show safeguard_engine
Safeguard Engine State
:
Disabled
Safeguard Engine Current Status
:
Normal Mode
=======================================================
CPU Utilization Information:
Rising Threshold
:
30%
Falling Threshold
:
20%
Trap/Log State
:
Disabled
Mode
:
Fuzzy
DGS-3627:admin#
Page 614 / 757
xStack
®
DGS-3600 Series Layer 3 Gigabit Ethernet Managed Switch CLI Manual
610
80
SECURE SHELL (SSH) COMMANDS
The steps required to use the Secure Shell (SSH) protocol for secure communication between a remote PC (the SSH
Client) and the Switch (the SSH Server), are as follows:
Create a user account with admin-level access using the
create account admin <username> <password>
command. This is identical to creating any other admin-lever user account on the Switch, including specifying a
password. This password is used to login to the Switch, once secure communication has been established using
the SSH protocol.
Configure the user account to use a specified authorization method to identify users that are allowed to establish
SSH connections with the Switch using the
config ssh user
command. There are three choices as to the method
SSH will use to authorize the user, and they are password, publickey and hostbased.
Configure the encryption algorithm that SSH will use to encrypt and decrypt messages sent between the SSH
Client and the SSH Server.
Finally, enable SSH on the Switch using the
enable ssh
command.
After following the above steps, you can configure an SSH Client on the remote PC and manage the Switch using secure,
in-band communication.
The Secure Shell (SSH) commands in the Command Line Interface (CLI) are listed (along with the appropriate
parameters) in the following table.
Command
Parameters
config ssh algorithm
[3DES | AES128 | AES192 | AES256 | Arcfour | blowfish | cast128 | twofish128 |
twofish192 | twofish256 | MD5 | SHA1 | RSA | DSS] [enable | disable]
show ssh algorithm
config ssh authmode
[password | publickey | hostbased] [enable | disable]
show ssh authmode
config ssh user
<username 15> authmode [hostbased [hostname <domain_name 32> |
hostname_IP <domain_name 32> <ipaddr>] | password | publickey]
show ssh user authmode
config ssh server
{maxsession <int 1-8>| contimeout <sec 120-600> | authfail {<int 2-20> | rekey
[10min | 30min | 60min | never] | port < tcp_port_number 1-65535>}
enable ssh
disable ssh
show ssh server
Each command is listed, in detail, in the following sections.
config ssh algorithm
Purpose
Used to config ssh server algorithm.
Syntax
config ssh algorithm [3DES | AES128 | AES192 | AES256 | Arcfour | blowfish | cast128 |
twofish128 | twofish192 | twofish256 | MD5 | SHA1 | RSA | DSS] [enable | disable]
Description
The config ssh algorithm command config the ssh service algorithm.
Page 615 / 757
xStack
®
DGS-3600 Series Layer 3 Gigabit Ethernet Managed Switch CLI Manual
611
config ssh algorithm
Parameters
3DES
- Specify ssh server encryption algorithm.
blowfish
- Specify ssh server encryption algorithm.
AES(128,192,256)
- Specify ssh server encryption algorithm.
arcfour
- Specify ssh server encryption algorithm.
cast128
- Specify ssh server encryption algorithm.
twofish(128,192,256)
- Specify ssh server encryption algorithm.
MD5
- Specify ssh server data integrality algorithm.
SHA1
- Specify ssh server data integrality algorithm.
DSS
- Specify ssh server public key algorithm.
RSA
- Specify ssh server public key algorithm.
enable
- Specify to enable the algorithm.
disable
- Specify to disable the alogirthm.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example usage:
To enable ssh server public key algorithm:
DGS-3627:admin# config ssh algorithm DSS enable RSA enable
Command: config ssh algorithm DSS enable RSA enable
Success.
DGS-3627:admin#
show ssh algorithm
Purpose
Used to show ssh server algorithm.
Syntax
show ssh algorithm
Description
The show ssh algorithm command show the ssh service algorithm.
Parameters
None.
Restrictions
None.
Example usage:
To show server algorithm:

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top