No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

FAQ-How does NE80E Product Check Which Board Suffers from TTL Timeout Packet Attack

Publication Date:  2012-07-27 Views:  34 Downloads:  0
Issue Description
Q:
When NE80E suffers from TTL timeout packet attack, CPU usage is high. How to check the board suffers from TTL timeout packet alarm?
Alarm Information
Null
Handling Process
A:
display ip statistics slot 2     //Display with this command                           
  Input:   sum            4503785      local             2516                   
           bad protocol       0      bad format           0                     
           bad checksum       0      bad options          0                     
           TTL exceeded   787257    //    receiving TTL timeout IP packet number of the board                                      
  Output:  forwarding         0      local            786037                    
           dropped            0      no route             0                     
  Fragment:input              0      output               0                     
           dropped            0                                                 
           fragmented         0      couldn't fragment    0                     
  Reassembling:sum            0      timeouts             0    
Check with the command. If the following number of TTL exceeded increases quickly, it is TTL timeout packet attack or there is loop.     
Root Cause
Null
Suggestions
Null

END