EasyManuals Logo

Zte ZXR10 8900E series User Manual

Zte ZXR10 8900E series
132 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #77 background imageLoading...
Page #77 background image
ZXR10 8900E series Core Switch Product Description
ZTE Confidential Proprietary
© 2013 ZTE CORPORATION. All rights reserved.
67
3.8.5.1 Anti-DDoS Attack
Due to more and more complicated network environment, the switch should be more
competent in fighting against attacks. There are lots of ways to prevent DDoS attack,
CPU protection is a very important one.
Currently, controlling protocol message is used to protection CPU. The speed of
messages sent to CPU can be set. If the real speed exceeds the threshold, this message
will be discarded or its transport priority will be modified. CPU protection is implemented
based upon the following principle.
CPU protection is mainly realized by using the switch to monitor the speed of messages
sent to CPU. The speed threshold for messages going to CPU can be set on devices.
When messages are sent to CPU in an abnormal speed, related alarms will be generated
and the NM will be aware of the attack. At this moment, the NM can decide how to
process the message according to the message type and speed. When the protocol
protection unit finds one protocol message is transferred too fast, this unit will send an
alarm to warn user. After reading this alarm, the user can configure protocol protection
shutdown to avoid CPU failure.
Currently, the supported protocols include most L2 and L3 protocols. The covered Ipv4
protocol consists of: OSPF, PIM, IGMP, VRRP, ICMP, ARP reply, ARP request, group
mng, VBASE, DHCP, RIP, BGP, telnet, LDP_TCP, LDP_UDP, TTL=1, BPDU, SNMP,
MSDP and RADIUS. The included Ipv6 protocols are: MLD, ND, ICMP6, BGP4+, RIPng,
OSPFv3, LDPtcp6, LDPudp6, telnet6 and PIM6. L2 protocols cover some messages like
STP and MSTP, as well as some switch L2 ring protocols.
Based upon common CPU protection, 8900E has multi-level CPU protection which
includes: hardware protection, software protection and protocol stack protection. CPU
supports multiple hardware queues to make sure the precedence of key messages. Key
message filtering makes sure key messages are sent to CPU. Protocol stack controls
message transport speed. Via multi-level protection, network efficiency and key services
operation are guaranteed.
Moreover, ZXR10 8900E can also use MAC address learning restriction, port speed
restriction and multi-level ACL filtering to avoid DDoS attack.
3.8.5.2 Unicast Reverse Path Forwarding (uRPF)
Unicast Reverse Path Forwarding (uRPF) can be used to avoid the network attack based
upon source address spoofing.Source address spoofing (A legal address made by
attacker) in common DoS attack uses a fake source address to prevent the device from
providing normal services. uRPF can avoid such attacks effectively. uRPF is made for
normal route search. Normally when router receives packet and gets its destination
address, route table will be looked up as per the destination address. If the route is found,
the packet will be forwarded, otherwise, it will be discarded. uRPF by getting source
address and incoming interface of the packet sets source address as the target address

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Zte ZXR10 8900E series and is the answer not in the manual?

Zte ZXR10 8900E series Specifications

General IconGeneral
SeriesZXR10 8900E
CategorySwitch
Storage Temperature-40°C to 70°C
Relative Humidity5% to 95% (non-condensing)
TypeModular switch
Port DensityUp to 576 x 10GE ports, 144 x 40GE ports
Ports10GE, 40GE, 100GE
RedundancyRedundant power supplies, fans, and control modules
Network ProtocolsIPv4/IPv6, MPLS, VXLAN
ManagementCLI, SNMP, Web
Power SupplyAC/DC
WeightVaries by configuration
Operating Temperature0°C to 45°C
Power ConsumptionVaries by configuration
Slots8

Related product manuals