No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

Configuration Guide - Security

S7700 and S9700 V200R011C10

This document describes the configurations of Security, including ACL, reflective ACL, local attack defense, MFF, attack defense, traffic suppression and storm control, ARP security, port security, DHCP snooping, ND snooping, PPPoE+, IPSG, SAVI, URPF, keychain, separating the management plane from the service plane, security risks.
Rate and give feedback :
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Understanding MPAC

Understanding MPAC

On an enterprise network shown in Figure 16-1, user-side interfaces need to send a large number of packets to the CPUs of network devices. Some packets are attack packets targeting at CPUs.

Figure 16-1  MPAC network diagram

Packets from user-side interfaces have two types of impact on network devices:

  • Excess packets cause a high CPU usage and degrade CPU performance. Therefore, services cannot be processed in a timely manner.
  • Malicious attack packets cause a system breakdown.
An MPAC policy can be configured on subinterfaces, main interfaces, or globally to prevent CPU resource exhaustion and ensure nonstop network operations. The MPAC policy contains the rules that permit or deny the packets of some protocols and the packets with certain source/destination addresses:
  • When protocol packets match the policy in which the rule is permit, the packets are sent to the CPU for processing.
  • When protocol packets match the policy in which the rule is deny, the packets are discarded.
  • When protocol packets do not match the policy, the packets are sent to the CPU for processing.

Figure 16-2 shows the packet processing on a device with an MPAC policy configured. The MPCA policy can be configured according to service requirements.

Figure 16-2  Packet processing
Translation
Download
Updated: 2019-04-01

Document ID: EDOC1000178319

Views: 136025

Downloads: 78

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Share
Previous Next