No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

NE20E-S2 V800R010C10SPC500 Configuration Guide - Security 01

This is NE20E-S2 V800R010C10SPC500 Configuration Guide - Security
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Example for Configuring Static BGP IPv6 VPN Flow Specification

Example for Configuring Static BGP IPv6 VPN Flow Specification

In IPv6 VPNs, if the characteristics of DoS or DDoS attack traffic are known, use the static BGP IPv6 VPN Flow Specification function by manually configuring BGP IPv6 VPN Flow Specification routes to ensure network security.

Networking Requirements

As shown in Figure 11-16, in an IPv6 VPN, CE1 belongs to AS 100, whereas PE1 belongs to AS 200. PE1 is an ingress of AS 200. AS 200 communicates with AS 100 through PE1.

The attack source in AS 100 may flow into AS 200 through PE1, severely affecting network performance of AS 200.

In this situation, configure static BGP IPv6 VPN Flow Specification to address this problem. The operation process is as follows: Configure a BGP IPv6 VPN Flow Specification route manually and establish a BGP IPv6 VPN Flow Specification peer relationship. Then the route is sent to PE1 to discard the attack traffic or limit its rate.

Figure 11-16 Configuring static BGP IPv6 VPN Flow Specification
NOTE:

Interfaces 1 in this example are GE 0/1/0.



Configuration Roadmap

The configuration roadmap is as follows:

  1. Configure an IP address for each involved interface.

  2. Create a VPN instance on PE1 and bind the VPN instance to their interfaces.

  3. On PE1, configure a BGP IPv6 VPN Flow Specification route (FlowSpec1) to discard the attack traffic whose source port number is 159.

Data Preparation

To complete the configuration, you need the following data:
  • AS number of CE1 (100) and AS number of PE1 (200)

  • Name of a VPN instance (vpna)

Procedure

  1. Configure an IP address for each interface.

    For detailed configurations, see the configuration files in this example.

  2. Create a VPN instance and bind it to each interface.

    # Configure PE1.

    [~PE1] ip vpn-instance vpna
    [*PE1-vpn-instance-vpna] ipv6-family
    [*PE1-vpn-instance-vpna-af-ipv6] route-distinguisher 2:2
    [*PE1-vpn-instance-vpna-af-ipv6] vpn-target 2:2 export-extcommunity
    [*PE1-vpn-instance-vpna-af-ipv6] vpn-target 2:2 import-extcommunity
    [*PE1-vpn-instance-vpna-af-ipv6] commit
    [~PE1-vpn-instance-vpna-af-ipv6] quit
    [~PE1-vpn-instance-vpna] quit
    [~PE1] interface GigabitEthernet0/1/0
    [~PE1-GigabitEthernet0/1/0] undo shutdown
    [*PE1-GigabitEthernet0/1/0] ip binding vpn-instance vpna
    [*PE1-GigabitEthernet0/1/0] ipv6 enable
    [*PE1-GigabitEthernet0/1/0] ipv6 address 2001:db8:1::2 64
    [*PE1-GigabitEthernet0/1/0] commit
    [~PE1-GigabitEthernet0/1/0] quit

  3. Configure a BGP IPv6 VPN Flow Specification route.

    # Configure PE1.

    [~PE1] flow-route FlowSpec1 ipv6 vpn-instance vpna
    [*PE1-flow-route-ipv6-vpna] if-match source-port equal 159
    [*PE1-flow-route-ipv6-vpna] apply deny
    [*PE1-flow-route-ipv6-vpna] commit
    [~PE1-flow-route-ipv6-vpna] quit

  4. Configure BGP IPv6 VPN Flow Specification peer relationships.

    # Configure PE1.

    [~PE1]bgp 200
    [*PE1-bgp] vpn-instance vpna
    [*PE1-bgp-instance-vpna] peer 2001:db8:1::2 as-number 100
    [*PE1-bgp-instance-vpna] quit
    [*PE1-bgp] ipv6-flow vpn-instance vpna
    [*PE1-bgp-flow-6-vpna] peer 2001:db8:1::2 enable
    [*PE1-bgp-flow-6-vpna] commit
    [~PE1-bgp-flow-6-vpna] quit
    [~PE1-bgp] quit

  5. Verify the configuration.

    # Check whether BGP IPv6 VPN Flow Specification peer relationships are established on PE1. The command output shows that BGP IPv6 VPN Flow Specification peer relationships are established.

    <PE1> display bgp flow vpnv6 vpn-instance vpna peer
     
     BGP local router ID : 0.0.0.0
     Local AS number : 200
     Total number of peers : 1                 Peers in established state : 0
    
      VPN-Instance vpna, Router ID 0.0.0.0:
      Peer            V          AS  MsgRcvd  MsgSent  OutQ  Up/Down       State  PrefRcv
      2001:DB8:1::1   4         200        0        0     0 00:06:15        Idle        0

    # Check information about the BGP IPv6 VPN Flow Specification routes received by PE1.

    <PE1> display bgp flow vpnv6 vpn-instance vpna routing-table
     
     BGP Local router ID is 0.0.0.0
     Status codes: * - valid, > - best, d - damped, x - best external, a - add path,
                   h - history,  i - internal, s - suppressed, S - Stale
                   Origin : i - IGP, e - EGP, ? - incomplete
     RPKI validation codes: V - valid, I - invalid, N - not-found
    
        
     VPN-Instance vpna, Router ID 0.0.0.0:
    
     Total Number of Routes: 1
     * >  ReIndex : 1
          Dissemination Rules:
           Src. Port      : eq 159
           MED      : 0                   PrefVal  : 0                   
           LocalPref:                           
           Path/Ogn :  i

    # Check the traffic filtering rule carried in the BGP IPv6 VPN Flow Specification route by specifying ReIndex of the route.

    <PE1> display bgp flow vpnv6 vpn-instance vpna routing-table 1
     
     BGP local router ID : 0.0.0.0
     Local AS number : 200
     ReIndex : 1
     Order   : 0
     Dissemination Rules :
       Src. Port      : eq 159
     
     BGP flow-ipv6 routing table entry information of 1:
     Local : FlowSpec1
     Match action :
       apply deny
     Route Duration: 0d00h07m04s
     AS-path Nil, origin igp, MED 0, pref-val 0, valid, local, best, pre 0
     Not advertised to any peer yet

Configuration Files

  • CE1 configuration file

    #
    sysname CE1  
    #               
    interface GigabitEthernet0/1/0
     undo shutdown  
     ipv6 enable
     ipv6 address 2001:db8:1::1/64
    #               
    bgp 100         
     peer 2001:db8:1::2 as-number 200
     #
     ipv4-family unicast
      undo synchronization
     #              
     ipv6-family flow
      peer 2001:db8:1::2 enable
    #               
    return
  • PE1 configuration file

    #
    sysname PE1
    #
    ip vpn-instance vpna
     ipv6-family
      route-distinguisher 2:2
      vpn-target 2:2 export-extcommunity
      vpn-target 2:2 import-extcommunity
    #               
    interface GigabitEthernet0/1/0
     undo shutdown  
     ip binding vpn-instance vpna
     ipv6 enable    
     ipv6 address 2001:db8:1::2/64
    #               
    bgp 200         
     #
     ipv4-family unicast
      undo synchronization
     #              
     vpn-instance vpna
      peer 2001:db8:1::1 as-number 200
     #              
     ipv6-flow vpn-instance vpna
      peer 2001:db8:1::1 enable
    #
    flow-route FlowSpec1 ipv6 vpn-instance vpna
     if-match source-port equal 159
     apply deny
    #               
    return
Translation
Download
Updated: 2019-01-02

Document ID: EDOC1100055397

Views: 20500

Downloads: 39

Average rating:
This Document Applies to these Products
Related Version
Related Documents
Share
Previous Next