Ddos Secure Cli User Guide
Ddos Secure Cli User Guide
Release
5.14.2-0
Published: 2014-10-30
ii
Table of Contents
About the Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvii
Documentation and Release Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvii
Documentation Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvii
Documentation Feedback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xix
Requesting Technical Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xx
Self-Help Online Tools and Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . xx
Opening a Case with JTAC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xx
Part 1
CLI Overview
Chapter 1
Command-Line Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Introducing the DDoS Secure CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Connecting to a DDoS Appliance Using a Serial Port Connection . . . . . . . . . . . . . . 4
Connecting to a DDoS Appliance Using an SSH Connection . . . . . . . . . . . . . . . . . . 4
Connecting to a DDoS Appliance Using a System Console Connection . . . . . . . . . 5
Starting a CLI Session . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Navigating Through the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Changing the Configuration Using the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Part 2
Configuration Commands
Chapter 2
Access Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Access Control Configuration Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
show access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
set access https . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
set access https_juniper . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
set access ssh . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
set access ssh_juniper . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
set access snmp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Chapter 3
Appliance Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Appliance Mode Configuration Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
show appliance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
set appliance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Chapter 4
iii
Chapter 5
Chapter 6
Chapter 7
Chapter 8
CHARM Tunables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
CHARM Tunables Configuration Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
show tuneable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
remove tuneable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
set tuneable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
Chapter 9
Chassis Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
Chassis Definitions Configuration Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
show chassis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
set chassis vip . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
set chassis blade . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
set chassis bgp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
set chassis reroute . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
Chapter 10
Chapter 11
iv
Table of Contents
Chapter 12
Debug Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Debug Options Configuration Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
show debugging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
set debugging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
Chapter 13
External Authenticators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
External Authenticators Configuration Overview . . . . . . . . . . . . . . . . . . . . . . . . . . 84
show auth . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
set auth . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
Chapter 14
Filter Aggregation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
Filter Aggregation Configuration Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
show fagg . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
remove fagg . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
set fagg . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
Chapter 15
Layer 7 Inspection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Layer 7 Inspection Configuration Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
show inspect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
remove inspect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
set inspect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Chapter 16
Logging Thresholds . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
Logging Thresholds Configuration Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
show threshold view . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
show threshold create . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
show threshold offenders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
show threshold alert . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
set threshold . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
show incidents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
set incidents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
Chapter 17
Chapter 18
Chapter 19
Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
Network Configuration Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
show interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
set interface management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
set interface datashare . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126
set interface protected . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127
set interface internet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128
set interface global . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
Chapter 20
NetFlow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
NetFlow Configuration Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
show netflow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138
set netflow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
Chapter 21
Chapter 22
Portals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
Portals Configuration Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
show portal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151
remove portal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152
set portal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
Chapter 23
Chapter 24
Chapter 25
Protected IP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
Protected IP Configuration Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
show protected . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165
remove protected . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166
set protected . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168
Chapter 26
Chapter 27
Pseudol3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
Pseudol3 Configuration Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
show pseudol3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177
set pseudol3 interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178
vi
Table of Contents
Chapter 28
Chapter 29
Shares . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187
Shares Configuration Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187
show share . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189
remove share . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190
set share . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191
Chapter 30
SNMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
SNMP Configuration Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
show snmp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194
set snmp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195
Chapter 31
Chapter 32
Syslog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201
Syslog Configuration Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201
show syslog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202
set syslog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203
Chapter 33
Chapter 34
Chapter 35
vii
Chapter 36
Usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221
Usage Configuration Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221
show usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223
set usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224
Chapter 37
Chapter 38
Chapter 39
Chapter 40
Chapter 41
Chapter 42
viii
Table of Contents
Part 3
Appendix
Appendix A
Appendix B
Appendix C
Appendix D
Appendix E
Appendix F
Appendix G
Appendix H
Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335
Troubleshooting a DDoS Secure Appliance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335
Appendix I
Part 4
Index
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 341
ix
List of Figures
Part 3
Appendix
Appendix G
xi
xii
List of Tables
About the Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvii
Table 1: Notice Icons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xviii
Table 2: Text and Syntax Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xviii
Part 1
CLI Overview
Chapter 1
Command-Line Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Table 3: Basic CLI Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Part 2
Configuration Commands
Chapter 3
Appliance Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Table 4: Appliance Mode Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Chapter 4
Chapter 5
Chapter 6
Chapter 7
Chapter 8
CHARM Tunables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
Table 10: Tunable Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
Chapter 9
Chassis Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
Table 11: Chassis Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
Chapter 10
Chapter 11
Chapter 12
Debug Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Table 14: Debug Option Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Chapter 13
External Authenticators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
Table 15: External Authenticator Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
Table 16: External Authenticator Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
xiii
Chapter 14
Filter Aggregation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
Table 17: Filter Aggregation Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
Table 18: Filter Fixed Value Formats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
Chapter 15
Layer 7 Inspection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Table 19: Show Inspect Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Chapter 16
Logging Thresholds . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
Table 20: Logging Threshold Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
Table 21: Logging Threshold Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
Table 22: Incident Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
Chapter 17
Chapter 18
Chapter 19
Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
Table 26: Interface Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
Table 27: Interface Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122
Table 28: DNS Parameter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
Table 29: Route Parameter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
Chapter 20
NetFlow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
Table 30: NetFlow Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
Chapter 21
Chapter 22
Portals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
Table 32: Portal Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
Chapter 23
Chapter 24
Chapter 25
Protected IP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
Table 35: Protected IP Address Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
Chapter 26
Chapter 27
Pseudol3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
Table 37: Pseudo Layer 2 and Layer 3 Parameters . . . . . . . . . . . . . . . . . . . . . . . . 176
Chapter 29
Shares . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187
Table 38: Share Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187
Chapter 30
SNMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
Table 39: SNMP Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
xiv
List of Tables
Chapter 31
Chapter 32
Syslog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201
Table 41: Syslog Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201
Chapter 33
Chapter 34
Chapter 35
Chapter 36
Usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221
Table 46: Usage Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221
Chapter 37
Chapter 39
Chapter 40
Chapter 41
Chapter 42
Part 3
Appendix
Appendix A
Appendix B
Appendix C
xv
Appendix D
Appendix E
Appendix F
Appendix G
xvi
To obtain the most current version of all Juniper Networks technical documentation,
see the product documentation page on the Juniper Networks website at
http://www.juniper.net/techpubs/.
If the information in the latest release notes differs from the information in the
documentation, follow the product Release Notes.
Juniper Networks Books publishes books by Juniper Networks engineers and subject
matter experts. These books go beyond the technical documentation to explore the
nuances of network architecture, deployment, and administration. The current list can
be viewed at http://www.juniper.net/books.
Documentation Conventions
Table 1 on page xviii defines notice icons used in this guide.
xvii
Meaning
Description
Informational note
Caution
Warning
Laser warning
Tip
Best practice
Table 2 on page xviii defines the text and syntax conventions used in this guide.
Description
Examples
xviii
Description
Examples
| (pipe symbol)
broadcast | multicast
# (pound sign)
[ ] (square brackets)
; (semicolon)
[edit]
routing-options {
static {
route default {
nexthop address;
retain;
}
}
}
GUI Conventions
Bold text like this
Documentation Feedback
We encourage you to provide feedback, comments, and suggestions so that we can
improve the documentation. You can provide feedback by using either of the following
methods:
Online feedback rating systemOn any page at the Juniper Networks Technical
Documentation site at http://www.juniper.net/techpubs/index.html, simply click the
stars to rate the content, and use the pop-up form to provide us with information about
your experience. Alternately, you can use the online feedback form at
https://www.juniper.net/cgi-bin/docbugreport/.
xix
JTAC hours of operationThe JTAC centers have resources available 24 hours a day,
7 days a week, 365 days a year.
Find solutions and answer questions using our Knowledge Base: http://kb.juniper.net/
To verify service entitlement by product serial number, use our Serial Number Entitlement
(SNE) Tool: https://tools.juniper.net/SerialNumberEntitlementSearch/
xx
xxi
xxii
PART 1
CLI Overview
CHAPTER 1
Command-Line Overview
This chapter includes gives an overview of the DDoS Secure CLI and describes the
available show commands.
Related
Documentation
ANSI terminal software through a serial line connection to the appliance serial port.
The appliance displays the hardware initialization and booting diagnostic messages at
9600 baud. This is the recommended speed to use for troubleshooting.
To switch to a faster speed for normal system management, it is necessary to send a
BREAK to switch to the next available speed, followed by two or three RETURN or
LINE-FEED characters. Each time a BREAK is sent, the speed cycles between the
supported speeds in the following order:
Related
Documentation
The DDoS Secure appliance management interface must first be configured with an
appropriate IP address, network mask, default gateway, and the interface speed.
For the detailed procedure, see the DDoS Secure GUI User Guide. Once enabled, the
configuration can be modified through the CLI.
Related
Documentation
5.14.1-0
CENTOS_6_3
201305201820GMT
5.14.1-0
31.3G
16
A1RYMW1
90:B1:1C:2A:A3:28
J-DDOS-SEC-AP2
Tue May 21 16:54:09 2013
10G
31G
16
64K
32M
256
4K
16K
4M
512K
64K
64K
32K
8K
512K
512K
1K
2K
512K
JS>
5.14.1-0
CENTOS_6_3
201305201820GMT
5.14.1-0
31.3G
16
A1RYMW1
90:B1:1C:2A:A3:28
J-DDOS-SEC-AP2
Tue May 21 16:54:09 2013
10G
31G
16
64K
32M
256
4K
16K
4M
512K
64K
64K
32K
8K
512K
512K
1K
2K
512K
JS>
For more information about how users are allocated to different portals (virtual
subappliances) and how users can gain access to the CLI to allow configuration of their
individual portals, see the DDoS Secure GUI User Guide. If the portal is not the master
portal (-General-), then it is indicated in the prompt as follows:
Prompt> ssh l user 192.168.0.196
[email protected] users password:password
JS portal>show config
version e2
configuration portal
remove user all
remove server all
remove fagg all
remove filter all
set operation mode defensive countries all aslist all
set user portaluser password $1$blI73sjE$wA.A7vHC1qvdfROlEHJtM. perms administrator
...
set mail server none dailystats yes alerts no
JS portal>
If the CLI connection is to the Standby member of an Active/Standby pair, then the
prompt also includes (Standby):
JS(Standby)>
or
JS(Standby) portal>
Related
Documentation
To automatically complete the current command you are typing, press Tab. If the
command cannot be completed, press Tab again to display a brief list of available
matching commands. Once you have entered a command, press Tab to complete the
next parameter. If there is more than one option available, pressing Tab displays the
available valid parameters. If this is in the middle of a free-text input parameter value
field, terminate the field with a space first.
NOTE: If the command is a free-text value field, you must complete the
field with a space character before you press the Tab key.
Press the up and down arrow keys to display the previously entered commands.
Use the left and right arrow keys to move back and forth along the text line currently
displayed; this allows you to edit any part of the command line before you submit the
command by pressing Enter.
When the text to be displayed is longer than a single screen, the output is paused and
the phrase more is shown at the bottom of the screen. To display the next page of
information, press [SPACE]. To display the next line, press [ENTER]. To exit the display
and return the CLI to the previous command prompt, press [Q].
To stop the terminal pause (for example, if the CLI commands are scripted), use the set
terminal pause off command. This setting is not replicated across sessions and therefore
needs to be entered at the start of every CLI session, when required. To restart the terminal
pause during a session, use the set terminal pause off command.
Related
Documentation
showThis is a general-purpose command used to display the current value for various
entry), such as a server and all its settings. Most individual settings, however, cannot
be removed, because they must have a value. Such settings can only be changed from
one value to another with the set command.
When you make changes to the configuration using the CLI, the pending changes are
recorded and applied later (using apply command) when instructed by the operator. At
any time prior to applying the new configuration, the list of changes to be made can be
displayed or cleared.
When the first configuration line is entered, a snapshot of the current configuration is
made and all subsequent configuration changes are made against the snapshot
configuration. The apply command takes the snapshot configuration, applies the
configuration changes, and then activates the new configuration. This method avoids
the possibility of other users changing the configuration at the same time in such a way
that your configuration cannot be applied.
NOTE: You cannot use the now keyword when there are pending changes to
be applied.
All CLI commands are case-sensitive and must be entered in lowercase. Most
parameters are also case-sensitive; exceptions are detailed in the applicable
sections. Table 3 on page 9 describes the basic CLI commands.
Description
apply
write
discard
It is often helpful when a large amount of configuration has been performed and an error
detected, to use the show pending changes command prior to discard. Then relevant
parts of the previous configuration changes can be copied to the terminal. If another user
has started editing the configuration, you can also use this method to show the
configuration changes you have made. Once the other user has finished, you can then
use the discard command, paste your changes, and then apply the configuration. This
procedure avoids undoing the other user changes.
revert
now
The now option is not a command; rather, it can be appended as the last argument to
any CLI command used to change the configuration. When you append the now option
to a command, that command is not added to the list of pending changes but instead
is executed immediately, changing the current running configuration. The now option
cannot be used if there are any pending changes waiting to be applied. Any such pending
changes must either be applied or discarded before a command can use the now
command.
exit
quit
context
show config
Syntax
Description
show config
Sample Output
JS>show config
set
set
set
set
show run
Syntax
Description
show running
Sample Output
JS>show running
Displays the list of pending changes for the current user session. The pending changes
of other CLI users are not displayed.
Sample Output
JS>set access https 192.168.0.0/16
JS>set access ssh 192.168.0.0/16
JS>set access snmp 192.168.0.0/16
JS>show pending changes
set access https 192.168.0.0/16
set access ssh 192.168.0.0/16
set access snmp 192.168.0.0/16
JS>
Related
Documentation
10
PART 2
Configuration Commands
11
12
CHAPTER 2
Access Control
This chapter explains access control for DDoS Secure and describes the available
advanced configuration commands.
show access
When you are configuring access control for an appliance, the appliance interprets IP
addresses and their networks as classless. You can use both IP host addresses and IP
network addresses. You can specify a network address in either network/mask or
network/bits format.
Any compound value you enter is parsed as a single entry; there can be no spaces between
the entries and the commas that separate them.
Related
Documentation
13
show access
Syntax
Description
Sample Output
JS>show access all
set access https 192.168.1.0/24,192.168.2.3
set access https_juniper yes
set access ssh all
set access ssh_juniper yes
set access snmp 192.168.1.1
You can also show individual values by specifying the access type of interest. For example,
JS>show access https:
JS>show access https
set access https 192.168.0.0/16
set access https_juniper yes
Related
Documentation
14
Related
Documentation
15
Related
Documentation
16
Sets the list of IP addresses permitted to connect through SSH to the command-line
configuration interface.
NOTE: The IP address of the client using the command through an SSH
connection cannot be removed from the access list. This avoids the possibility
of users locking themselves out. If SSH access has to be totally disabled,
then this can be done through the CLI over the serial interface or through the
Web-based configuration interface.
Related
Documentation
17
Related
Documentation
18
Enables/disables the DDoS Secure appliance defined list of appliance public IP addresses
permitted to connect to the CLI configuration interface.
Related
Documentation
Lists the IP addresses permitted to connect to the SNMP management interface for MIB
browsing.
19
20
CHAPTER 3
Appliance Mode
This chapter explains appliance mode for DDoS Secure and describes the available
advanced configuration commands.
show appliance
set appliance
Value
Description
allportalsdefending
yes|no
asymrouting
yes|no
autoblockenable
yes|no
autoblockratet1
RATE
21
Value
Description
autoblockratet2
RATE
autoblocksynrst
VALUE
autoblockfragrate
RATE
autoblockgetrate
RATE
autonoblock
IPRANGE|none
fips_enabled
yes|no
groupingid
GROUPINGID
hamode
HAMODE
hostname
SERVERNAME
mode
MODE
priority
PRIORITY
serverautodetect
yes|no
22
Value
Description
ssl_inspection
realtime|lowlatency
trackindeterminate
yes|no
testenvironment
yes|no
Related
Documentation
23
show appliance
Syntax
Description
show appliance
Sample Output
JS>show appliance
set appliance hostname 10.30.12.121 mode logging hamode
active-standby autoblockenable yes autoblockratet1 200
autoblockratet2 100 autoblocksynrst 300 autoblockfragrate 10
autoblockgetrate 300 autonoblock none serverautodetect yes
trackindeterminate yes testenvironment no allportalsdefending
no fips_enabled no ssl_inspection lowlatency asymrouting no
priority 0 groupingid 15
Related
Documentation
24
set appliance
Syntax
Description
Sample Output
JS>set appliance priority 1
JS>apply
JS>show appliance
set appliance hostname 192.168.0.189 mode logging hamode active-standby
autoblockenable yes autoblockratet1 200 autoblockratet2 100 autoblocksynrst 300
autoblockfragrate 10
autoblockgetrate 300 autonoblock none serverautodetect yes trackindeterminate yes
testenvironment no
allportalsdefending no fips_enabled no ssl_inspection lowlatency asymrouting no
priority 1 groupingid 15
JS>
Related
Documentation
25
26
CHAPTER 4
show filter
remove filter
set filter
Once a TCP filter session is established, the corresponding traffic is allowed to pass until
the session finishes, even if the original permitting filter is altered or replaced with a
stricter filter that would otherwise block (any new traffic sessions will be blocked if
appropriate). However, UDP, ICMP, and other IP address filter sessions will be blocked
27
as soon as a new filter is applied that would no longer permit that sessions traffic. An
FTP (port 21) filter also handles the data connections (PORT and PASV) automatically,
so no additional filter needs to be defined for FTP.
The appliance filtering system has a logical filter named default. This is reserved for use
as a default filter where no filter selection has been configured. The filter default allows
all traffic to pass, with the exception of UDP port 80, and some ICMP types with no
bandwidth restrictions.
There are three other predefined filters with the names broadcast, multicast, and redirect.
These filters are applied by default to IP address broadcast, multicast, and redirect traffic,
respectively. In contrast to filter default, the settings for these predefined filters can be
altered.
A filter must already be defined before it can be named within an option that requires a
filter. A filter can be named against more than one server configuration or filter
aggregation.
Table 5 on page 28 describes the filter parameters and their formats.
Value
Default Value
Description
src_tcp
PORTLIST|all|none
all
tcp
PORTLIST|all|none
none
src_udp
PORTLIST|all|none
all
udp
PORTLIST|all|none
none
icmp
ICMPTYPELIST|all|none
none
icmp6
ICMP6TYPELIST|all|none
none
otherip
PROTOCOLLIST
none
countries
COUNTRIES|all|none
all
aslist
ASLIST|all
all
28
Value
Default Value
Description
networks
IPRANGE|all|none
all
validpkts
PKTS|U
burstpkts
PKTS|U
validspeed
SPEED|U
Guaranteed bandwidth.
burstspeed
SPEED|U
Burstable bandwidth.
ratelimit-by
filter|internet-ip|
protected-ip|match-ips|
session
filter
Related
Documentation
29
show filter
Syntax
Description
Sample Output
JS>show filter test1
set filter test1 src_tcp all tcp 80 http 80 src_udp none udp none icmp none
none otherip none countries all networks all aslist all validpkts
U burstpkts U validspeed U burstspeed U ratelimit-by filter
Alternatively, the reserved filter name all can be specified to show all defined filters.
JS>show filter all
set filter inb-tcp src_tcp all tcp all http 80 src_udp none udp none icmp
none icmp6 none otherip none countries all networks all aslist all validpkts
U burstpkts U validspeed U burstspeed U ratelimit-by filter
set filter inb-udp src_tcp none tcp none http none src_udp all udp
1-79,81-442,444-65535 icmp none icmp6 none otherip none countries all
networks all aslist all validpkts 30K burstpkts 30K validspeed U burstspeed
U ratelimit-by filter
set filter inb-icmp src_tcp none tcp none http none src_udp none udp none icmp
0-18 icmp6 1-4,128-154 otherip none countries all networks all aslist all
validpkts 1K burstpkts 1K validspeed U burstspeed U ratelimit-by filter
set filter inb-other src_tcp none tcp none http none src_udp none udp none icmp
none icmp6 none otherip all countries all networks all aslist all validpkts
30K burstpkts 30K validspeed U burstspeed U ratelimit-by filter
set filter out-tcp src_tcp all tcp all http 80 src_udp none udp none icmp
none icmp6 none otherip none countries all networks all aslist all validpkts
U burstpkts U validspeed U burstspeed U ratelimit-by filter
set filter out-udp src_tcp none tcp none http none src_udp all udp all icmp
none icmp6 none otherip none countries all networks all aslist all validpkts
U burstpkts U validspeed U burstspeed U ratelimit-by filter
set filter out-icmp src_tcp none tcp none http none src_udp none udp none icmp
0-18 icmp6 1-4,128-154 otherip none countries all networks all aslist all
validpkts U burstpkts U validspeed U burstspeed U ratelimit-by filter
set filter out-other src_tcp none tcp none http none src_udp none udp none icmp
none icmp6 none otherip all countries all networks all aslist all validpkts
U burstpkts U validspeed U burstspeed U ratelimit-by filter
set filter multicast src_tcp none tcp none http none src_udp all udp all icmp
0-18 icmp6 1-4,128-154 otherip all countries all networks all aslist all
validpkts U burstpkts U validspeed U burstspeed U ratelimit-by filter
set filter broadcast src_tcp none tcp none http none src_udp all udp
1-6,8-65535 icmp none icmp6 none otherip all countries all networks all aslist
all validpkts U burstpkts U validspeed U burstspeed U ratelimit-by filter
set filter intercept src_tcp all tcp all http 80 src_udp none udp none icmp
none icmp6 none otherip none countries all networks all aslist all validpkts
U burstpkts U validspeed U burstspeed U ratelimit-by filter
30
NOTE: The logical filter default is not listed. Attempts to use default, or any
nonexistent filter name as a parameter to the show filter command, result in
the error message Not configured. This error is also displayed when the
parameter all is used but no filters are defined.
Related
Documentation
31
remove filter
Syntax
Description
Deletes a specified filter. The specified filter will not be deleted if it is currently assigned
to a server. The logical filter default cannot be deleted.
Sample Output
JS>show filter test1
set filter test1 tcp 80 udp none icmp none icmp6 none otherip none
countries all networks all aslist all validpkts U burstpkts U
validspeed U burstspeed U ratelimit-by filter
JS>remove filter test1
JS>apply
JS>show filter test1
Not configured
The remove filter command can also be used to delete all filters, as long as none are
assigned to a server, by using the reserved filter name all. If all the filters cannot be
removed, then an error message is returned and none are removed. If all the filters can
be safely removed, the user will be prompted for confirmation.
JS>show filter all
set filter test1 tcp 80 udp none icmp none icmp6 none otherip none validpkts U
countries all networks all aslist all burstpkts U validspeed U burstspeed U
ratelimit-by filter
set filter test2 tcp 80,443 udp none icmp none icmp6 none otherip none
countries all networks all aslist all validpkts U burstpkts U validspeed U
burstspeed U ratelimit-by filter
JS>remove filter all
Are you sure [yes/no]? yes
JS>apply
JS>show filter all
Not configured
NOTE: It is possible to turn off prompting, which can be useful when using
automated scripts.
Related
Documentation
32
set filter
Syntax
Description
Creates a new filter entry or to modifies an existing one. At a minimum, a name and one
parameter value pair must be specified when using this command. If the name specified
does not match an existing filter entry, a new entry is created with that name, and any
parameter value pair not specified causes that parameter to be set with the default value.
If an entry already exists that matches the name specified then only the parameter value
pairs specified are altered.
The following protocol numbers have no effect when used as values with the other IP
address parameter, as these protocols are handled separately by their own parameter
value pair:
1 (ICMP
6 (TCP)
17 (UDP)
58 (ICMPv6)
Sample Output
JS>show filter all
set filter inb-tcp tcp all http 80 udp none icmp none icmp6 none otherip none
countries all networks all aslist all validpkts U burstpkts U validspeed U
burstspeed U ratelimit-by filter
set filter inb-udp tcp none http none udp 1-79,81-442,444-65535 icmp none
icmp6 none otherip none countries all networks all aslist all validpkts 30K
burstpkts 30K validspeed U burstspeed U ratelimit-by filter
set filter inb-icmp tcp none http none udp none icmp 0-18 icmp6 1-4,128-154
otherip none countries all networks all aslist all validpkts 1K burstpkts 1K
validspeed U burstspeed U ratelimit-by filter
set filter inb-other tcp none http none udp none icmp none icmp6 none
otherip all countries all networks all aslist all validpkts 30K
burstpkts 30K validspeed U burstspeed U ratelimit-by filter
JS>set filter test1 tcp 80-85,443
JS>set filter test2 udp none icmp 8
JS>apply
33
Related
Documentation
34
CHAPTER 5
show bgp
remove bgp
Value
Description
ddos_secure
IPADDRESS
The IP address of the DDoS Secure appliance that the BGP Flow
Spec injector will run on. For active-standby HA, both management
IP addresses need to be defined as separate statements.
our_as
ASNUMBER
Local AS#.
neigh_ip
IPADDRESS
neigh_as
ASNUMBER
Neighbor AS#.
neigh_pass
PASSWORD
lowertimer
NUMBER
35
Value
Description
autoinject
yes|no
ratelimit
SPEED
source
IPNETWORK
destination
IPNETWORK
Network address that will match the Destination IP. Note that only
protected IPs can be defined here, and the entire network must sit
in one portal.
protocol
PROTOCOLLIST
srcport
PORTLIST
dstport
PORTLIST
tcpflags
TCPFLAGS
icmpcode
ICMPCODELIST
icmptype
ICMPTYPELIST
fragment
FRAGMENTLIST
length
LENGTHLIST
dscp
DSCPLIST
action
ACTION
actionvalue
ACTIONVALUE
Related
Documentation
36
show bgp
Syntax
Description
Sample Output
JS>show bgp all
set bgp peer ddos_secure 192.168.0.189 our_as 65099 neigh_ip 192.168.0.254
neigh_as 65014 neigh_pass 123456 lowertimer 1000 autoinject no
ratelimit 100K
NOTE: A simple peer (MX Series router) working definition example that
matches the DDoS Secure BGP definition above is:
routing-options {
router-id 192.168.0.254;
autonomous-system 65014;
}
protocols {
bgp {
family inet {
flow {
no-validate everything;
}
}
authentication-key 123456
group flow {
multihop;
local-preference 100;
local-address 192.168.0.254;
export everything;
peer-as 65099;
neighbor 192.168.0.189;
}
}
}
Related
Documentation
37
Description
Defines a BGP setup where the defined DDoS Secure appliance acts as a BGP Flow Spec
injector. For active-standby HA systems, each DDoS Secure needs a BGP definition, and
the upstream router needs to recognize both DDoS Secure as peers.
If autoinject is set to no when a BGP Flow Spec rule is dynamically created, DDoS Secure
sets it to the Inactive state; so that it is not uploaded to the BGP peer. If autoinject is set
to yes when the BGP FlowSpec rule is created, it is set to the Active state and the Flow
Spec rule is immediately uploaded to the BGP Peer. Through the GUI, you can easily swap
the dynamic Flow Spec rules between Inactive and Active states.
NOTE: If the DDoS Secure is running in the Logging mode, then the dynamic
Flow Spec rules are always created as Inactive.
Related
Documentation
38
Description
Related
Documentation
Allows you to manually configure the Flow Spec rules that will always be sent to the BGP
peer. Only specify the entities that you want to match against. Destination and action
are mandatory.
39
remove bgp
Syntax
Description
Sample Output
JS>remove bgp all
JS>apply
JS>show bgp all
No BGP definitions set up
Description
all
peer
flowspec
Related
Documentation
40
CHAPTER 6
show block
set block ip
set block as
Value
Description
country
COUNTRIES|all|none
cignoreip
IPLIST
ip
IPRANGE|none
as
1 - 65535
Related
Documentation
41
show block
Syntax
Description
show block
Sample Output
JS>show block
set
set
set
set
Related
Documentation
42
block
block
block
block
country none
cignoreip none
ip none
as none
Drops all traffic to or from a country for the duration of an attack that originates in that
country. Specify a list of countries to block IP addresses from those countries, as tagged
by MaxMind. This requires that you periodically update the MaxMind database.
Sample Output
JS>set block country USA
JS>apply
JS>show block
set
set
set
set
Related
Documentation
block
block
block
block
country USA
cignoreip none
ip none
as none
43
Allows access to and from specific, trusted IP addresses from a country while blocking
all other traffic to or from that country for the duration of an attack that originates in that
country.
Sample Output
JS>set block cignoreip 1.2.3.4
JS>apply
JS>show block
set
set
set
set
Related
Documentation
44
block
block
block
block
country USA
cignoreip 1.2.3.4
ip none
as none
set block ip
Syntax
Description
Permanently drops all traffic to or from a specific set of IP addresses. You specify the
list of IP addresses or networks, separated by commas.
Sample Output
JS>set block ip 10.20.0.0/25
JS>apply
JS>show block
set
set
set
set
Related
Documentation
block
block
block
block
country USA
cignoreip none
ip 10.20.0.0/25
as none
45
set block as
Syntax
Description
Permanently drops all traffic to or from a specific AS. You specify the list of AS numbers,
separated by commas.
Sample Output
JS>set block as 65001
JS>apply
JS>show block
set
set
set
set
Related
Documentation
46
block
block
block
block
country USA
cignoreip none
ip 10.20.0.0/25
as 65001
CHAPTER 7
show geoip
remove geoip
set geoip ip
-wnAny IP addresses matching this code are always white-listed, but no logs
generated.
The IP address lookup database is built in the following order, with subsequent entries
overwriting any previous IP address definitions:
MaxMind Information
47
Value
Description
code
COUNTRYCODE
ip
IPRANGE
freq
FREQUENCY
url
URL
header
HEADER
respcode
CODE
routing
HEADER
Related
Documentation
48
show geoip
Syntax
Description
show geoip
<all|ip|url|megaproxy_ip|megaproxy_url|auto_akamai>
Sample Output
JS>show geoip all
No geoip definitions set up
Related
Documentation
49
remove geoip
Syntax
Description
remove geoip
<all|ip|url|megaproxy_ip|megaproxy_url|auto_akamai>
Sample Output
JS>remove geoip all
JS>apply
JS>show geoip all
No geoip definitions set up
Related
Documentation
50
set geoip ip
Syntax
Description
Sets a range of IP addresses to be associated with the given country code. The country
codes include -bl (black-list) and -wl (white-list) as described in Country Code (geoip)
Definitions Configuration Overview on page 47.
Sample Output
JS>set geoip ip code -bl ip 1.2.3.4
Related
Documentation
51
Updates the country code to use for the list of IP addresses, networks, or IP address range
(one entry per line) at the given URL, updated at the given frequency.
Sample Output
JS>set geoip url code -wl freq h url http://www.domain.com/white-list.txt
Related
Documentation
52
Description
Sample Output
JS>set geoip megaproxy_ip header X-Forwarded-For: respcode 503 ip 1.2.3.4-1.2.3.7
Related
Documentation
53
Description
Defines a remote URL that contains a list of IP addresses, networks, or IP address ranges,
one per line, to be treated as a megaproxy.
If the defined Header is matched (typically X-forwarded-for:), then the original client is
abstracted and used for charm calculations. If the session is to be dropped (for example:
original client is blacklisted) then a suitable message is constructed using the specified
HTTP response code (for example: 503).
The list of IP addresses is updated at the specified frequency.
Sample Output
JS>set geoip megaproxy_url header True-Client-IP: respcode 503 freq h url
http://www.domain.com/megaproxy-list.txt
Related
Documentation
54
The auto_akamai parameter instructs DDoS Secure to assume that client's traffic that
contains the header: true-client-IP: is coming from Akamai, and to treat the client IP
address as being a megaproxy.
Sample Output
JS>set geoip url code bl freq h http://black.list.com/list.txt
JS>set geoip auto_akamai respcode 503
JS>apply
JS>show geoip all
set geoip url code bl freq h url http://black.list.com/list.txt
set geoip auto_akamai respcode 503
Related
Documentation
55
56
CHAPTER 8
CHARM Tunables
This chapter explains CHARM tunables for DDoS Secure and describes the available
advanced configuration commands.
show tuneable
remove tuneable
set tuneable
Value
Default Value
Description
charmgetratebias
BIAS
10
charmconnratebias
BIAS
charmconnbias
BIAS
Related
Documentation
57
show tuneable
Syntax
Description
Sample Output
JS>show tuneable all
set tuneable charmgetratebias 10
Related
Documentation
58
remove tuneable
Syntax
Description
Sample Output
JS>remove tuneable all
JS>apply
JS>show tuneable all
tuneable disabled
Related
Documentation
59
set tuneable
Syntax
Description
set tuneable
<charmgetratebias|charmconnratebias|charmconnbias> <BIAS>
Sample Output
JS>set tuneable charmgetratebias 10
JS>apply
JS>show tuneable all
set tuneable charmgetreatebias 10
Related
Documentation
60
CHAPTER 9
Chassis Definitions
This chapter explains chassis definitions for DDoS Secure and describes the available
advanced configuration commands.
show chassis
Value
Description
ip
IPADDRESS
IP address to be used.
netmask
NETMASK
Netmask to be used.
ddos_secure
IPADDRESS
our_as
ASNUMBER
Local AS #.
neigh_ip
IPADDRESS
neigh_as
ASNUMBER
Neighbor AS #.
neigh_pass
PASSWORD
61
Value
Description
comm_as
ASNUMBER
Trigger community AS #.
comm_no
NUMBER
lowertimer
NUMBER
Related
Documentation
62
show chassis
Syntax
Description
Sample Output
JS>show chassis all
set chassis blade ip 192.168.0.6
Related
Documentation
63
Related
Documentation
64
Defines the common VIP by which the DDoS Secure appliance chassis can be accessed.
Related
Documentation
Defines the management access for the individual blade within the chassis. This is also
used to define the IP addresses of DDoS Secure appliances that are participating in BGP
rerouting.
65
Description
Related
Documentation
66
Defines the BGP setup where the defined DDoS Secure appliance is going to act as a
trigger router for injecting BGP routes. This is used in conjunction with the reroute
definitions for a portal, which are applied on a per-protected-IP-address basis, to inject
or withdraw a route.
Related
Documentation
Sets a permanent injection of the defined protected IP address into the BGP trigger
routing tables.
67
68
CHAPTER 10
show disabled
set disabled
Value
Description
all
yes|no
badudppacket_no_data
yes|no
tcpattack_nodata
yes|no
blockedstate_invalidstate
yes|no
blockedstate_nostate
yes|no
Related
Documentation
69
show disabled
Syntax
Description
show disabled
Sample Output
JS>show disabled
Nothing disabled
Related
Documentation
70
set disabled
Syntax
Description
Sample Output
JS>set disabled all yes
JS>apply
JS>show disabled
set disabled unknownsession_nostate yes
unknownsession_invalidstate yes badudppacket_nodata yes
tcpattack_nodata yes badippacket_reflectedroute yes
tcpattack_url_ratelimited yes udpattack_dns_ratelimited yes
udpattack_sip_ratelimited yes badtcppacket_chksum yes
tcpattack_http_format yes unknownsession_reflective yes
Related
Documentation
71
72
CHAPTER 11
show clock
show timezones
Value
Description
timenow
TIMESTRING
timezone
TIMEZONE
ntp
IPLIST|none
Related
Documentation
73
show clock
Syntax
Description
show clock
Displays the current time, time zone and NTP server configured.
Sample Output
JS>show clock
set clock timenow 2003-01-15T15:26:27
set clock timezone Europe/London
set clock ntp none
Related
Documentation
74
Sets the system clock. It is important to set the system time zone to the correct value
before adjusting the clock time. This is because the set clock timenow command assumes
that all time values entered are offset from UTC time by the local time zone. If the local
time is configured while the time zone is set to a region with a different time offset from
UTC, the clock will effectively be wrong by the number of hours separating the current
local time zone from the system set time zone. This difference will clear when the system
time zone value is corrected.
NOTE: This command is applied immediately without having to use the now
parameter or using the apply command.
Sample Output
JS>show clock timenow
set clock timenow 2013-11-14T14:21:27
JS>set clock timenow 2013-11-14T14:00:00
JS>apply
JS>show clock timenow
set clock timenow 2013-11-14T14:00:03
JS>set clock timenow 14 nov2013 15:00:00
JS>apply
JS>show clock timenow
set clock timenow 2013-11-14T15:00:03
JS>set clock timenow 14-nov-13 16:00:00
JS>apply
JS>show clock timenow
set clock timenow 2013-11-14T16:00:03
JS>set clock timenow nov 14 17:00:00 2013
JS>apply
JS>show clock timenow
JS>set clock timenow 2013-11-14T17:00:02
JS>apply
Related
Documentation
75
Sets the time zone of the appliance. A complete list of valid time zones can be displayed
using the show timezones command.
Sample Output
JS>show clock
set clock timenow 2003-08-13T21:01:11
set clock timezone Europe/London
set clock ntp none
JS>set clock timezone Europe/Paris
JS>apply
JS>show clock
set clock timenow 2003-08-13T22:01:22
set clock timezone Europe/Paris
set clock ntp none
Related
Documentation
76
Defines the NTP server or servers. A DDoS Secure appliance unit can also take advantage
of an NTP server to help maintain a more accurate value for the time. The set clock ntp
command can be used to define one or more NTP servers to be used for synchronizing
the time. Time synchronizations are performed every hour but if the difference between
the appliance local clock and the NTP server clock is greater than a few minutes. It is
recommended that the set clock timenow command is used first to bring the two clocks
closer together.
Sample Output
JS>set clock ntp 128.118.25.3,140.162.8.25,130.88.200.98
Related
Documentation
77
show timezones
Syntax
Description
show timezones
Displays a complete list of time zones supported by the DDoS Secure appliance. Since
the list is long, the system automatic paging takes over before the first line of the answer
scrolls off the top of the display. It is important to note that time zone values are
case-sensitive.
Sample Output
JS>show timezones
Available timezones:
Africa/Abidjan
Africa/Accra
Africa/Addis_Ababa
Africa/Algiers
Africa/Asmera
Africa/Bamako
Africa/Bangui
Africa/Banjul
Africa/Bissau
Africa/Blantyre
Africa/Brazzaville
Africa/Bujumbura
Africa/Cairo
Africa/Casablanca
-- more
Related
Documentation
78
CHAPTER 12
Debug Options
This chapter explains debug options for DDoS Secure and describes the available
advanced configuration commands.
show debugging
set debugging
Value
Description
bandwidth
yes|no
packetrate
yes|no
blockedprotocol
yes|no
blockedstate
yes|no
attackip
yes|no
IP attack debugging.
attacktcp
yes|no
attackudp
yes|no
attackicmp
yes|no
attackotherip
yes|no
79
Value
Description
attackfragment
yes|no
badippacket
yes|no
badtcppacket
yes|no
badudppacket
yes|no
badicmppacket
yes|no
badotherippacket
yes|no
overloadedip
yes|no
all
yes|no
worstoffenders
yes|no
autoblacklist
yes|no
80
show debugging
Syntax
Description
show debugging
Sample Output
JS>show debugging
set debugging bandwidth no packetrate no blockedprotocol no blockedstate no
attackip no attacktcp no attackudp no attackicmp no attackotherip no
attackfragment no badippacket no badtcppacket no badudppacket no
badicmppacket no badotherippacket no overloadedip no worstoffenders yes
autoblacklist yes incidentdetail no
Related
Documentation
81
set debugging
Syntax
Description
Related
Documentation
82
Sets the <PARAMETER> <VALUE> pair is taken from the debug option parameters.
CHAPTER 13
External Authenticators
This chapter explains external authenticators for DDoS Secure and describes the available
advanced configuration commands.
show auth
set auth
83
Value
Description
radius
RADIUS
tacacs+
TACACS+
Table 16 on page 84 describes the external authenticator parameters and their formats.
Value
Description
server
IPADDRESS
backup
IPADDRESS|none
secret
SECRET
enabled
yes|no
port
PORT
protocol
TPROTOCOL
TACACS+ protocol.
service
TSERVICE
TACACS+ service.
Related
Documentation
84
show auth
Syntax
Description
show auth
Sample Output
JS>show auth
set auth radius server 192.168.0.3 backup none port 1812 secret secret
enabled yes
set auth tacacs+ server 192.168.0.3 backup none secret secret-1 protocol
lcp service juniper appliance enabled no
Users with operator permissions will be shown the secrets masked out.
JS>show auth
set auth radius server 192.168.0.3 backup none port 1812 secret xxxxxxxx
enabled yes
set auth tacacs+ server 192.168.0.3 backup none secret xxxxxxxx protocol
lcp service juniper enabled no
Related
Documentation
85
set auth
Syntax
Description
Related
Documentation
86
CHAPTER 14
Filter Aggregation
This chapter explains filter aggregation for DDoS Secure and describes the available
advanced configuration commands.
show fagg
remove fagg
set fagg
87
Value
Default Value
Description
filtera
FILTERNAME
-undefined-
filterb
FILTERNAME
-undefined-
filterc
FILTERNAME
-undefined-
filterd
FILTERNAME
-undefined-
filtere
FILTERNAME
-undefined-
filterf
FILTERNAME
-undefined-
filterg
FILTERNAME
-undefined-
Table 18 on page 88 describes the filter fixed value and its format.
Description
-undefined-
88
show fagg
Syntax
Description
Sample Output
JS>show fagg web-agg
set fagg web-agg filtera web filterb default filterc undefined- filterd
undefined- filtere undefined- filterf undefined- filterg undefined-
Alternatively, the reserved filter name all can be specified to show all defined filters.
JS>show fagg all
set fagg web-agg filtera web filterb default filterc undefined- filterd
undefined- filtere undefined- filterf undefined- filterg undefinedset fagg example-agg filtera default filterb undefined- filterc
undefined- filterd undefined- filtere undefined- filterf
undefined- filterg undefined-
Related
Documentation
89
remove fagg
Syntax
Description
Deletes a specified filter aggregation. The specified filter aggregation will not be deleted
if it is currently assigned to a server.
Sample Output
JS>show fagg web-agg
set fagg web-agg filtera web filterb default filterc undefined- filterd
undefined- filtere undefined- filterf undefined- filterg
undefinedJS>remove fagg web-agg
JS>apply
JS>show fagg web-agg
Not configured
The remove fagg command can also be used to delete all filter aggregations, as long as
none are assigned to a server, by using the reserved filter name all. If all the filter
aggregations cannot be removed then an error message is returned and none are removed.
If all the filter aggregations can be safely removed, the user will be prompted for
confirmation.
JS>show fagg all
set fagg web-agg filtera web filterb default filterc undefined- filterd
undefined- filtere undefined- filterf undefined- filterg
undefinedset fagg example-agg filtera default filterb undefined- filterc undefinedfilterd undefined- filtere undefined- filterf undefined- filterg undefinedJS>remove fagg all
Are you sure [yes/no]? yes
JS>apply
JS>show fagg all
Not configured
NOTE: It is possible to turn off prompting which can be useful when using
automated scripts.
Related
Documentation
90
set fagg
Syntax
Description
Creates a new filter aggregation entry or modifies an existing one. At a minimum, a name
and one parameter value pair must be specified when using the command. If the name
specified does not match an existing filter entry, a new entry is created with that name
and any parameter value pair not specified causes that parameter to be set with the
default value. If an entry already exists that matches the name specified then only the
parameter value pairs specified are altered.
Sample Output
JS>show fagg all
set fagg web-agg filtera web filterb default filterc undefined- filterd
undefined- filtere undefined- filterf undefined- filterg undefinedset fagg example-agg filtera default filterb undefined- filterc
undefined- filterd undefined- filtere undefined- filterf undefinedfilterg undefinedJS>set fagg web-agg filterg webplus
JS>apply
JS>show fagg all
set fagg web-agg filtera web filterb default filterc undefined- filterd
undefined- filtere undefined- filterf undefined- filterg webplus
set fagg example-agg filtera default filterb undefined- filterc undefinedfilterd undefined- filtere undefined- filterf undefined- filterg undefined-
Related
Documentation
91
92
CHAPTER 15
Layer 7 Inspection
This chapter explains Layer 7 inspection for DDoS Secure and describes the available
advanced configuration commands.
show inspect
remove inspect
set inspect
The matching of the initial part of the request, which can possibly include some
parameters.
Where possible, we recommend that you use matching methods 1 and 2 for performance
reasons.
Table 19 on page 93 describes the show inspect parameters.
Value
Example
Description
url_match
all|STRING
http://a.b.c/file
url_regex
all|REGEX
http://a.*/file
93
Value
Example
Description
dns_match
all|STRING
www.juniper.net?A
dns_regex
all|REGEX
*?ANY
sip_match
all|STRING
sip_regex
all|REGEX
sip_eregex
all|EREGEX
94
show inspect
Syntax
Description
show inspect
url_match <all|STRING>|url_prefix <all|STRING>|
url_regex <all|REGEX>|url_eregex <all|EREGEX> |
dns_match <all|STRING>|dns_prefix <all|STRING>|
dns_regex <all|REGEX>|dns_eregex <all|EREGEX> |
sip_match <all|STRING>|sip_prefix <all|STRING>|
sip_regex <all|REGEX>|sip_eregex <all|EREGEX> |
sip_eregex <all|REGEX>|sip_eregex <all|EREGEX> >
Sample Output
JS>show inspect all
Inspect disabled
Related
Documentation
95
remove inspect
Syntax
Description
remove inspect
url_match <all|STRING>|url_prefix <all|STRING>|
url_regex <all|REGEX>|url_eregex <all|EREGEX>|
dns_match <all|STRING>|dns_prefix <all|STRING>|
dns_regex <all|REGEX>|dns_eregex <all|EREGEX>|
sip_match <all|STRING>|sip_prefix <all|STRING>|
sip_regex <all|REGEX>|sip_eregex <all|EREGEX>
Sample Output
JS>remove inspect all
JS>apply
JS>show inspect all
Inspect disabled
Related
Documentation
96
set inspect
Syntax
Description
set inspect
url_match <STRING>|url_prefix <STRING>|
url_regex <REGEX>|url_eregex <EREGEX> |
dns_match <STRING>|dns_prefix <STRING>|
dns_regex <REGEX>|dns_eregex <EREGEX> |
dns_match <STRING>|sip_prefix <STRING>|
dns_regex <REGEX>|sip_eregex <EREGEX> |
<bl|-bl|wl|BIAS> >
Allows for the checking of specific Layer 7 requests by different inspection methods.
Sample Output
JS>set inspect url_regex ^/index.asp$ 10
JS>apply
JS>show inspect all
set inspect url_regex "^www.site.com/index.asp$" 10 order 0
Related
Documentation
97
98
CHAPTER 16
Logging Thresholds
This chapter explains logging thresholds for DDoS Secure and describes the available
advanced configuration commands.
set threshold
show incidents
set incidents
99
Description
create
offenders
alert
view
Table 21 on page 100 describes the logging threshold parameters and their formats.
Value
Description
bandwidthenable
yes|no
bandwidthrate
THRESHOLD
packetrateenable
yes|no
packetraterate
THRESHOLD
blockedprotocolenable
yes|no
blockedprotocolrate
THRESHOLD
blockedstateenable
yes|no
blockedstaterate
THRESHOLD
attackipenable
yes|no
attackiprate
THRESHOLD
100
Value
Description
attacktcpenable
yes|no
attacktcprate
THRESHOLD
attackudpenable
yes|no
attackudprate
THRESHOLD
attackicmpenable
yes|no
attackicmprate
THRESHOLD
attackotheripenable
yes|no
attackotheriprate
THRESHOLD
attackfragmentenable
yes|no
attackfragmentrate
THRESHOLD
badippacketenable
yes|no
badippacketrate
THRESHOLD
badtcppacketenable
yes|no
badtcppacketrate
THRESHOLD
badudppacketenable
yes|no
badudppacketrate
THRESHOLD
101
Value
Description
badicmppacketenable
yes|no
badicmppacketrate
THRESHOLD
badotherippacketenable
yes|no
badotherippacketrate
THRESHOLD
overloadedipenable
yes|no
overloadediprate
THRESHOLD
allenable
yes|no
allrate
THRESHOLD
autoadjust
yes|no
102
Sample Output
JS>show threshold view
set
set
set
set
set
set
set
set
set
set
set
set
set
set
set
set
Related
Documentation
threshold
threshold
threshold
threshold
threshold
threshold
threshold
threshold
threshold
threshold
threshold
threshold
threshold
threshold
threshold
threshold
view
view
view
view
view
view
view
view
view
view
view
view
view
view
view
view
103
Sample Output
JS>show threshold create
set
set
set
set
set
set
set
set
set
set
set
set
set
set
set
set
set
Related
Documentation
104
threshold
threshold
threshold
threshold
threshold
threshold
threshold
threshold
threshold
threshold
threshold
threshold
threshold
threshold
threshold
threshold
threshold
create
create
create
create
create
create
create
create
create
create
create
create
create
create
create
create
create
autoadjust yes
bandwidthenable yes bandwidthrate 10
packetrateenable yes packetraterate 10
blockedprotocolenable yes blockedprotocolrate 10
blockedstateenable yes blockedstaterate 10
attackipenable yes attackiprate 10
attacktcpenable yes attacktcprate 10
attackudpenable yes attackudprate 10
attackicmpenable yes attackicmprate 10
attackotheripenable yes attackotheriprate 10
attackfragmentenable yes attackfragmentrate 10
badippacketenable yes badippacketrate 10
badtcppacketenable yes badtcppacketrate 10
badudppacketenable yes badudppacketrate 10
badicmppacketenable yes badicmppacketrate 10
badotherippacketenable yes badotherippacketrate 10
overloadedipenable yes overloadediprate 10
Sample Output
JS>show threshold offenders
set
set
set
set
set
set
set
set
set
set
set
set
set
set
set
set
Related
Documentation
threshold
threshold
threshold
threshold
threshold
threshold
threshold
threshold
threshold
threshold
threshold
threshold
threshold
threshold
threshold
threshold
offenders
offenders
offenders
offenders
offenders
offenders
offenders
offenders
offenders
offenders
offenders
offenders
offenders
offenders
offenders
offenders
105
Sample Output
JS>show threshold alert
set
set
set
set
set
set
set
set
set
set
set
set
set
set
set
set
Related
Documentation
106
threshold
threshold
threshold
threshold
threshold
threshold
threshold
threshold
threshold
threshold
threshold
threshold
threshold
threshold
threshold
threshold
alert
alert
alert
alert
alert
alert
alert
alert
alert
alert
alert
alert
alert
alert
alert
alert
set threshold
Syntax
Description
Sets the <PARAMETER> <VALUE> pair is taken from the logging threshold parameter.
The threshold is the number of packets dropped per second while the attack is in progress.
Once this threshold rate is exceeded, then the attack is logged as an incident. Create
rates are calculated on a per-protected-server basis. The offender rates are calculated
on a per-client basis.
NOTE: If the view/alert threshold is set lower than the create threshold for
a particular defense type, then it will only trigger when the Incident has been
created.
Related
Documentation
107
show incidents
Syntax
Description
show incidents
Displays the incident timeout, lifetime, and warning threshold. An incident is closed when
the packet rate has been below the create threshold for the specified number of timeout
minutes, or the incident has been open for more than the specified lifetime minutes.
An Incident is only alerted on if the Incident has been above the alert threshold for at
least the configured threshold number of seconds. Table 22 on page 108 describes the
incident parameters.
Sample Output
JS>show incidents
set incidents timeout 5 lifetime 60 threshold 60
Value
Description
timeout
TIMEOUT
lifetime
LIFETIME
threshold
THRESHOLDTIME
logrefresh
LOGREFRESHTIME
Related
Documentation
108
set incidents
Syntax
Description
Related
Documentation
109
110
CHAPTER 17
MAC Gateway
This chapter explains MAC gateway configuration for DDoS Secure and describes the
available advanced configuration commands.
show gateway
remove gateway
set gateway
Description
protected
Internet
Table 24 on page 112 describes the gateway parameters and their formats.
111
Value
Description
tospeed
SPEED
topkts
PKTS
Related
Documentation
112
show gateway
Syntax
Description
Sample Output
JS>show gateway all
set gateway internet 00:90:27:EA:BF:96 tospeed 0 topkts 10K
set gateway protected 01:02:03:04:05:06 tospeed 100M topkts 37.2K
Related
Documentation
113
remove gateway
Syntax
Description
NOTE: When the value all, or autodetected, is used with the remove gateway
command, the user is prompted to verify the selection. This prompting can
be turned off, which may be of use for scripted configurations.
When autodetected is used, the command is applied immediately without
having to use the now parameter or the apply command.
Sample Output
JS>remove gateway internet all
Are you sure [yes/no]? yes
Related
Documentation
114
set gateway
Syntax
Description
Adds a new gateway to the configuration, or changes the settings of a gateway already
defined in the configuration. The two parameters determine when bandwidth defense
and packet rate defense should be activated. By default, the packet rate defense
maximum threshold value <PKTS> is 25% of the maximum packet rate of the bandwidth
threshold value <SPEED> when composed entirely of minimum-size packets (this
percentage is increased for speeds less than 8M, and 100% for speeds less than 2M). A
higher value may be needed for a busy gateway heavily used by chat software, but many
gateways start to suffer from performance problems when over 50% of their rated
bandwidth limit is used to carry small packets alone.
Sample Output
JS>set gateway internet 00:01:02:03:04:05 tospeed 10M
JS>apply
JS>show gateway internet 00:01:02:03:04:05
set gateway internet 00:01:02:03:04:05 tospeed 10M topkts 3720
Related
Documentation
115
116
CHAPTER 18
Mail Reporting
This chapter explains mail reporting for DDoS Secure and describes the available
advanced configuration commands.
show mail
set mail
Value
Description
to
EMAILADDRESSES
from
EMAILADDRESS
server
IPADDRESS|none
wsserver
IPADDRESS|none
dailystats
yes|no
weeklystats
yes|no
monthlystats
yes|no
cluster
yes|no
117
Value
Description
alerts
yes|no
alertinterval
ALERTINTERVAL
Related
Documentation
118
show mail
Syntax
Description
show mail
Sample Output
JS>show mail
set mail server none dailystats yes weeklystats yes monthlystats yes alerts no
nullsender yes cluster no alertinterval 5
Related
Documentation
119
set mail
Syntax
Description
E-mail is not sent unless, at a minimum, the to, from, and server parameter values are
defined. The server IP address cannot be configured without valid to and from parameters.
The to and from parameters may be configured previously or along with the server IP
address. Below is an example warning given when attempting to set a server IP address
without valid to and from parameters.
Sample Output
JS>set mail server 192.168.0.10
mail: from <EMAILADDRESS>: missing
mail: to <EMAILADDRESS>: missing
JS>apply
Nothing to apply!
JS>set mail server 192.168.0.10 to [email protected]
from [email protected]
JS>apply
JS>show mail
set mail server 192.168.0.10 from [email protected]
to [email protected] dailystats yes weeklystats yes monthlystats yes
alerts no nullsender yes cluster no alertinterval 5
Once a parameter value has been set, that value will be used until changed. It is not
necessary to set all the values every time one of them needs to be changed. The server
address can be set to none to disable e-mails from being sent.
Related
Documentation
120
CHAPTER 19
Network
This chapter explains network configuration for DDoS Secure and describes the available
advanced configuration commands.
show interface
show dns
set dns
remove route
show route
set route
Description
management
protected
internet
The Internet interface, connected to hosts on the rest of the LAN or the Internet.
datashare
The data share interface, used to share state and incident information between the
appliances. This interface might not be available on all hardware configurations.
121
Description
global
For setting parameters that are common to both Internet and protected interfaces.
ipmi
The IPMI interface management IP address for remote appliance access (not available
on virtual appliances).
NOTE: The IPMI Controller must be enabled to use Network Access. This can only be
done through configuring the BIOS /IPMI during the appliance boot phase.
Table 27 on page 122 lists all the possible configuration parameters. However, not all
interface type will accept them. IP addresses can only be configured on the management
and data share interfaces as they are the only interfaces on an appliance unit that have
an active TCP/IP stack.
Value
Description
hwid
HARDWARE-ID
ip
IPADDRESS
netmask
NETMASK
gateway
IPADDRESS|none
linkmode
LINKMODE
fcmode
FCMODE
mtu
MTU_SIZE
lfpt
yes|no
cdp
yes|no
122
Value
Description
portpair1
yes|no
portpair2
yes|no
trackvlans
yes|no
dhcp
yes|no
Related
Documentation
123
show interface
Syntax
Description
show interface
Displays the network interface configuration. Each interface can be configured with or
without the unique appliance hardware ID (always shown on display output), that enables
the automatic generation of a common configuration to be shared with multiple DDoS
Secure appliance units. It also allows each unit to have customized network interface
configurations when the hardware ID is included.
Sample Output
JS>show interface
set interface management hwid 00:80:B4:07:CE:25 dhcp no ip 192.168.0.189 netmask
255.255.255.0 gateway 192.168.0.4 linkmode auto fcmode auto
set interface protected hwid 00:80:B4:07:CE:25 linkmode auto fcmode auto
set interface internet hwid 00:80:B4:07:CE:25 linkmode auto fcmode auto
set interface datashare hwid 00:80:B4:07:CE:25 dhcp no ip none netmask
255.255.255.0 linkmode auto fcmode auto
set interface global mtu 1500 cdp yes lfpt no trackvlans no portpair1 yes portpair2
yes
set interface ipmi hwid 00:80:B4:07:CE:25 dhcp no ip none netmask 255.255.255.0
gateway none
Related
Documentation
124
Description
Related
Documentation
Sets the basic TCP/IP configuration and link mode of the management interface. The
TCP/IP options are required for remote network management of the DDoS Secure
appliance. One or more parameters can be configured at the same time, with or without
the addition of the hwid parameter. But, the hwid parameter cannot be specified alone.
Even if only one parameter is set, all the current settings are shown when the configuration
is displayed.
125
Description
Related
Documentation
126
Sets the basic TCP/IP configuration and link mode of the data share interface. If the IP
address is set to none, then the data share interface will not be used. One or more
parameters can be configured at the same time, with or without the addition of the hwid
parameter. But, the hwid parameter cannot be specified alone. Even if only one parameter
is set, all the current settings are shown when the configuration is displayed.
Description
Sets the link mode of the protected interface. Not all link mode values can be supported
depending on the DDoS Secure appliance model. The specification of
hwid<HARDWARE-ID> is optional but helps avoid misconfiguration when sharing
configuration files between the appliances. The hwid option and its value are always
included when the configuration is displayed or saved. The hwid option cannot be specified
alone.
If this interface spans multiple interfaces (WS-3G), then all subinterfaces will be set to
the same specification. Load sharing across the multiple interfaces will be done by the
switch connected to the protected interface. Any 802.3ad packets are passed through
to the Internet interface for onward transmission, so that the Internet and protected
switches can set up their own link aggregation. Any packet received on one of the
subinterfaces will be sent out of the corresponding subinterface. The
upstream/downstream switch must be configured for lag/teaming mode and load share
appropriately.
Related
Documentation
127
Description
Sets the link mode of the Internet interface. Not all link mode values may be supported
depending on the DDoS Secure appliance model. The specification of hwid
<HARDWARE-ID> is optional but helps avoid misconfiguration when sharing configuration
files between the appliances. The hwid option and its value are always included when
the configuration is displayed or saved. The hwid option cannot be specified alone.
If this interface spans multiple interfaces (WS-3G), then all subinterfaces will be set to
the same specification. Load sharing across the multiple interfaces will be done by the
switch connected to the Internet interface. Any 802.3ad packets are passed through to
the protected interface for onward transmission so that the Internet and protected
switches can set up their own link aggregation. Any packet received on one of the
subinterfaces will be sent out of the corresponding subinterface. The
upstream/downstream switch must be configured for lag/teaming mode and load share
appropriately.
Related
Documentation
128
Description
Related
Documentation
Sets the common definition for traffic flowing between the Internet and protected
interfaces, which port pairs are enabled, and whether CDP packets are to be generated
or not on all interfaces.
129
Description
Related
Documentation
130
Sets the basic TCP/IP configuration of the IPMI interface. The TCP/IP options are required
for remote network IPMI management of the DDoS Secure appliance. One or more
parameters can be configured at the same time, with or without the addition of the hwid
parameter. But, the hwid parameter cannot be specified alone. Even if only one parameter
is set, all the current settings are shown when the configuration is displayed.
show dns
Syntax
Description
show dns
Sample Output
JS>show dns
set dns forwarder 192.168.0.3
Related
Documentation
131
set dns
Syntax
Description
Sets the IP address of the DNS server(s), to forward any DNS queries to.
Table 28 on page 132 lists the DNS configuration parameter.
Value
Description
forwarder
IPLIST
Sample Output
JS>set dns forwarder 192.168.0.3
JS>show dns
set dns forwarder 192.168.0.3
Related
Documentation
132
remove route
Syntax
Description
Related
Documentation
133
show route
Syntax
Description
Sample Output
JS>show route all
Not configured
Related
Documentation
134
set route
Syntax
Description
Sets additional routing incase the default gateway is insufficient to access different IP
addresses. It is not normally required, as the default gateway is usually sufficient.
Table 29 on page 135 lists the route configuration parameter.
Value
Description
cidr
IPNETWORK
gateway
IPADDRESS
Sample Output
JS>show route all
Not configured
JS>set route cidr 192.168.1.0/24 gateway 192.168.0.1
JS>apply
JS>show route all
set route cidr 192.168.1.0/24 gateway 192.168.0.1
Related
Documentation
135
136
CHAPTER 20
NetFlow
This chapter explains netflow configuration for DDoS Secure and describes the available
advanced configuration commands.
show netflow
set netflow
Value
Description
ip
IPLIST|IPMULTI|none
port
PORT
templatep
TEMPLATEP
templatem
TEMPLATEM
flowflush
FLOWFLUSH
Related
Documentation
137
show netflow
Syntax
Description
show netflow
Sample Output
JS>show netflow
set netflow ip 192.168.1.99 port 9996 templatep 1000 templatem 60 flowflush 1
Related
Documentation
138
set netflow
Syntax
Description
Related
Documentation
Sets the netflow collector to be configured to receive data on the correct port, and the
DDoS Secure appliance IP address to be configured as a valid source address.
139
140
CHAPTER 21
show preferred
Value
Description
clients
IPRANGE|none
countries
COUNTRIES|none
default
IPRANGE|none
whitelisted
IPRANGE|none
141
Value
Description
whitenolog
IPRANGE|none
Related
Documentation
142
show preferred
Syntax
Description
show preferred
[all|clients|countries|whitenolog|whitelisted|default]
Sample Output
JS>show preferred all
set
set
set
set
set
Related
Documentation
preferred
preferred
preferred
preferred
preferred
clients none
whitenolog 192.168.213.0/24,172.16.166.0/24
whitelisted none
default none
countries none
143
Sets the preferred clients. It is possible that there may be some client addresses that
need preferential treatment by the DDoS Secure appliance charm engine when the
protected servers are under load/attack conditions. By specifying these IP addresses in
the preferred clients list, these IP addresses will get a boost when calculated. If these IP
addresses do not perform properly, packets from these IP addresses may still get dropped.
Sample Output
JS>set preferred clients 192.168.10.1
JS>apply
JS>show preferred clients
set preferred clients 192.168.10.1
Related
Documentation
144
Specifies the countries in the preferred countries list. It is possible that there may be some
countries that need preferential treatment by the DDoS Secure appliance charm engine
when the protected servers are under load/attack conditions. By specifying these countries
in the preferred countries list, the IP addresses from these countries will get a charm
boost when is calculated. If the IP addresses from these countries misbehave badly,
packets from these IP addresses may still get dropped.
Sample Output
JS>set preferred countries GBR
JS>apply
JS>show preferred countries
set preferred countries GBR
Related
Documentation
145
Sets the preferred whitelist. If there is a client network that needs to pen-test servers
through the DDoS Secure appliance, even if the IP addresses are specified as preferred
clients, it is likely that the pen-test traffic will get blocked. The preferred whitelist option
effectively makes the appliance engine run in logging mode for the defined whitelisted
network addresses. For all other IP addresses, the appliance engine will run in the defined
appliance mode.
Sample Output
JS>set preferred whitelisted 10.20.0.0/25
JS>apply
JS>show preferred whitelisted
set preferred whitelisted 10.20.0.0/25
Related
Documentation
146
Sets the preferred whitelist for which no logging will be performed. If there is a client
network that needs to pen-test servers through the DDoS Secure appliance, even if the
IP addresses are specified as preferred clients, it is likely that the pen-test traffic will get
blocked. The preferred whitenolog option effectively makes the appliance engine run in
logging mode for the defined whitelisted network addresses. For all other IP addresses,
the appliance engine will run in the defined appliance mode.
NOTE: Any misbehaving activity to/from these IP addresses will not get
logged anywhere.
Sample Output
JS>set preferred whitenolog 10.30.0.0/25
JS>apply
JS>show preferred whitenolog
set preferred whitelisted 10.30.0.0/25
Related
Documentation
147
Sets the preferred default list. It is possible that there may be some client addresses that
always need default treatment by the DDoS Secure appliance engine when the protected
servers are under load/attack conditions. By specifying these IP addresses in the preferred
default list, these IP addresses will always get the default when is calculated. If these IP
addresses misbehave badly, packets from these IP addresses may still get dropped.
Sample Output
JS>set preferred default 192.168.20.1
JS>apply
JS>show preferred default
set preferred clients 192.168.20.1
Related
Documentation
148
CHAPTER 22
Portals
This chapter explains portals for DDoS Secure and describes the available advanced
configuration commands.
show portal
remove portal
set portal
Value
Description
ip
IPRANGE|all
vlan
VLANSDEF
validpkts
PKTS|U
burstpkts
PKTS|U
validspeed
SPEED|U
Guaranteed bandwidth.
149
Value
Description
burstspeed
SPEED|U
filters
FILTERS
rerouteminpkts
PKTS
reroutemaxpkts
PKTS
rerouteminspeed
SPEED
reroutemaxspeed
SPEED
protected
PROTECTED
Related
Documentation
150
show portal
Syntax
Description
Sample Output
JS>show portal test1
set portal test1 ip 10.0.0.0/24 validpkts 3720 burstpkts 3720 validspeed 10M
burstspeed 50M filters 31 rerouteminpkts 1K reroutemaxpkts 50K rerouteminspeed
20M reroutemaxspeed 1G protected 16
Alternatively the reserved portal name all can be specified to show all defined portals.
JS>show portal all
set portal DDoS Secure appliance ip all validpkts 37.2K burstpkts 37.2K
validspeed 100M burstspeed 100M filters 991 rerouteminpkts 1K
reroutemaxpkts 50K rerouteminspeed 20M reroutemaxspeed 1G protected 1
set portal example ip 10.0.0.0/24 validpkts 3720 burstpkts 3720 validspeed 10M
burstspeed 50M filters 31 rerouteminpkts 1K reroutemaxpkts 50K rerouteminspeed
20M reroutemaxspeed 1G protected 16
Related
Documentation
151
remove portal
Syntax
Description
Deletes a specific portal. This command can also be used to delete all current portals.
To do this the parameter value all is used instead of a portal name. When deleting all
portals the command will ask for confirmation.
Related
Documentation
152
set portal
Syntax
Description
Related
Documentation
153
154
CHAPTER 23
show operation
set operation
Value
Default Value
Description
mode
MODEPORTAL
defending
countries
COUNTRIES|all
all
aslist
ASLIST|all
all
Related
Documentation
155
show operation
Syntax
Description
show operation
Sample Output
JS>show operation
set operation mode defending countries all aslist all
Related
Documentation
156
set operation
Syntax
Description
Sample Output
JS>set operation mode logging
JS>apply
JS>show operation
set operation mode logging countries all aslist all
Related
Documentation
157
158
CHAPTER 24
Portal Defense
This chapter explains portal defense configuration for DDoS Secure and describes the
available advanced configuration commands.
show portaldefense
set portaldefense
Value
Description
backlog
BACKLOG|auto-BACKLOG
connections
CONNECTIONS|auto-CONNECTIONS
connrate
CONNRATE|auto-CONNRATE
gets
GETS|auto-GETS
Related
Documentation
159
show portaldefense
Syntax
Description
show portaldefense
Sample Output
JS>show portal defense
set portaldefense backlog U connections U connrate U gets U
Related
Documentation
160
set portaldefense
Syntax
Description
set portaldefense
[backlog <BACKLOG|auto-BACKLOG>]
[connections <CONNECTIONS|auto-CONNECTIONS>]
[connrate <CONNRATE|auto-CONNRATE>]
[gets <GETS|auto-GETS>]
Sets the portal defense. If all parameters are not present when defining the portal defense
then any unspecified parameters are automatically set to those of the default server.
Sample Output
JS>set portaldefense backlog 10000 connections U connrate U gets U
JS>apply
JS>show portaldefense
set portaldefense backlog 10000 connections U connrate U gets U
Related
Documentation
161
162
CHAPTER 25
Protected IP
This chapter explains protected IP configuration for DDoS Secure and describes the
available advanced configuration commands.
show protected
remove protected
set protected
Value
Description
name
PROTECTEDNAME
backlog
BACKLOG|auto-BACKLOG
connections
CONNECTIONS|auto-CONNECTIONS
connrate
CONNRATE|auto-CONNRATE
gets
GETS|auto-GETS
infilter
FILTERNAME|default
outfilter
FILTERNAME
163
Value
Description
sendtcprejects
yes|no
soap
yes|no
fragsdisabled
yes|no
mode
MODEIP
patgw
yes|no
Related
Documentation
164
show protected
Syntax
Description
Sample Output
JS>show protected all
set protected default backlog auto-1000 connections auto-1000
connrate auto-1000 gets auto-1000 infilter inbound outfilter
outbound sendtcprejects no soap no fragsdisabled no patgw no mode defending
set protected multicast backlog auto-1000
connections auto-1000 connrate auto-1000 gets auto-1000 infilter multicast
outfilter multicast sendtcprejects no soap no fragsdisabled no patgw no
mode defending
set protected broadcast backlog auto-1000 connections auto-1000
connrate auto-1000 gets auto-1000 infilter broadcast
outfilter broadcast sendtcprejects no soap no fragsdisabled no patgw no
mode defending
set protected indeterminate backlog auto-1000 connections auto-1000 connrate
auto-1000 gets auto-1000 infilter default outfilter default sendtcprejects no
soap no fragsdisabled no patgw no mode defending
Related
Documentation
165
remove protected
Syntax
Description
Deletes the specified protected IP address. The <IPADDRESS> field should have a value
that matches an existing defined protected IP address, an auto-detected protected entry
is not considered a defined protected IP address. If the IP address used does not match
any of the existing defined protected IP addresses, the command is ignored.
It is also possible to delete all the defined protected IP addresses. The command remove
protected all deletes all configured protected IP addresses but prompts for confirmation
before the command is accepted. The default protected parameters are not altered by
the use of the value all. The default, indeterminate, multicast, broadcast, and redirect
protected IP address settings cannot be removed.
NOTE: When the value all, or autodetected is used with the remove protected
command the user is prompted if they are sure. This prompting can be turned
off, which may be of use for scripted configurations.
When autodetected is used, the command is applied immediately without
having to use the now parameter or issue the apply command.
Sample Output
JS>remove protected all
Are you sure [yes/no]? yes
JS>show protected all
set protected default backlog auto-1000 connections auto-1000 connrate
auto-1000 gets auto-1000 infilter inbound outfilter outbound sendtcprejects
no soap no fragsdisabled no patgw no mode defending
set protected multicast backlog auto-1000 connections auto-1000 connrate
auto-1000 gets auto-1000 infilter multicast outfilter multicast
sendtcprejects no soap no fragsdisabled no patgw no mode defending
set protected broadcast backlog auto-1000 connections auto-1000 connrate
auto-1000 gets auto-1000 infilter broadcast outfilter broadcast
sendtcprejects no soap no fragsdisabled no patgw no mode defending
set protected indeterminate backlog auto-1000 connections auto-1000 connrate
auto-1000 gets auto-1000 infilter default outfilter default sendtcprejects
no soap no fragsdisabled no patgw no mode defending
set protected 10.50.1.1 backlog 1000 connections 5000 connrate 100
gets U infilter default outfilter default sendtcprejects yes
soap no fragsdisabled no patgw no mode defending
set protected 10.50.2.1 backlog 1000 connections 5000 connrate 100
gets U infilter default outfilter default sendtcprejects yes
soap no fragsdisabled no patgw no mode defending
JS>remove server 10.50.1.1
JS>apply
JS>show protected all
set protected default backlog auto-1000 connections auto-1000 connrate
166
Related
Documentation
167
set protected
Syntax
Description
set protected
<IPADDRESS|default|indeterminate|multicast|broadcast>
[name <PROTECTEDNAME>] [backlog <BACKLOG|auto-BACKLOG>]
[connections <CONNECTIONS|auto-CONNECTIONS>]
[connrate <CONNRATE|auto-CONNRATE>]
[gets <GETS|auto-GETS>]
[infilter <FILTERNAME|default>]
[outfilter <FILTERNAME|default>]
[sendtcprejects <yes|no>] [soap <yes|no>] [patgw <yes|no>]
[fragsdisabled <yes|no>] [mode <MODEIP>]
Sets the protected IP address. If all parameters are not present while defining a new
protected IP address then any unspecified parameters are automatically set to those of
the default protected IP address.
Sample Output
JS>show protected all
set protected default backlog auto-1000 connections auto-1000 connrate
auto-1000 gets auto-1000 infilter inbound outfilter outbound
sendtcprejects no soap no fragsdisabled no mode defending
set protected multicast backlog auto-1000 connections auto-1000 connrate
auto-1000 gets auto-1000 infilter multicast outfilter multicast
sendtcprejects no soap no fragsdisabled no mode defending
set protected broadcast backlog auto-1000 connections auto-1000 connrate
auto-1000 gets auto-1000 infilter broadcast outfilter broadcast
sendtcprejects no soap no fragsdisabled no mode defending
set protected indeterminate backlog auto-1000 connections auto-1000 connrate
auto-1000 gets auto-1000 infilter default outfilter default sendtcprejects
no soap no fragsdisabled no mode defending
set protected 10.50.2.1 backlog 1000 connections 5000 connrate 100 gets U
infilter default outfilter default sendtcprejects yes soap no
fragsdisabled no mode defending
JS>set protected 10.50.1.1 infilter default outfilter default
JS>apply
JS>show protected all
set protected default backlog auto-1000 connections auto-1000 connrate
auto-1000 gets auto-1000 infilter inbound outfilter outbound
sendtcprejects no soap no fragsdisabled no mode defending
set protected multicast backlog auto-1000 connections auto-1000 connrate
auto-1000 gets auto-1000 infilter multicast outfilter multicast
sendtcprejects no soap no fragsdisabled no mode defending
set protected broadcast backlog auto-1000 connections auto-1000 connrate
auto-1000 gets auto-1000 infilter broadcast outfilter broadcast sendtcprejects
no soap no fragsdisabled no mode defending
set protected indeterminate backlog auto-1000 connections auto-1000 connrate
auto-1000 gets auto-1000 infilter default outfilter default
sendtcprejects no soap no fragsdisabled no mode defending
set protected 10.50.1.1 backlog auto-1000 connections auto-1000 connrate
auto-1000 gets U infilter default outfilter default
sendtcprejects yes soap no fragsdisabled no mode defending
set protected 10.50.2.1 backlog 1000 connections 5000 connrate 100
168
Related
Documentation
169
170
CHAPTER 26
Proxy Server
This chapter explains proxy server for DDoS Secure and describes the available advanced
configuration commands.
show proxy
set proxy
Value
Description
proxyip
IPADDRESS|none
proxyport
PORT
proxyuser
USERNAME|none
proxypassword
PASSWORD
Related
Documentation
171
show proxy
Syntax
Description
show proxy
Sample Output
JS>show proxy
set proxy proxyip 192.168.1.99 proxyport 8080
Related
Documentation
172
set proxy
Syntax
Description
Related
Documentation
173
174
CHAPTER 27
Pseudol3
This chapter explains pseudol3 configuration for DDoS Secure and describes the available
advanced configuration commands.
show pseudol3
NOTE: Any IP addresses/routes configured for Layer 3 are not added to the
Linux network stack. This means that these IP addresses are not available
for ping from any external device. Also, the ping command is unable to ping
IP addresses connected to (or routed through) the Internet or Protected.
175
Value
Description
interface
internet|protected
ip/prefixlen
IP/PREFIXLEN
cidr
IPNETWORK
cidr
IPNETWORK|default|
default-ipv4
gateway
IPADDRESS
Related
Documentation
176
show pseudol3
Syntax
Description
show pseudol3<interface|network|route|all>
L2 Example
JS>show pseudol3 all
set pseudol3 interface located internet ip/prefixlen 192.168.1.230/24
set pseudol3 interface located protected ip/prefixlen 192.168.0.1/24
set pseudol3 route cidr default-ipv4 gateway 192.168.1.1
Related
Documentation
177
Assigns a given IP address (with prefix for the subnet) to either the Internet or protected
interfaces. This is only used for Layer 3 mode.
Sample Output
JS>set pseudol3 interface located internet ip/prefixlen 192.168.1.200/24
Related
Documentation
178
Adds a network to the L2/L3 (Split Network) mode. This is not compatible with Layer 3
mode.
Sample Output
JS>set pseudol3 network cidr 192.168.0.0/24
Related
Documentation
179
Sample Output
JS>set pseudol3 route cidr default gateway 192.168.1.1
Related
Documentation
180
Sample Output
JS>remove pseudol3 all
Related
Documentation
181
Removes all pseudol3 interface settings. This will disable layer3 operation.
Sample Output
JS>remove pseudol3 interface
Related
Documentation
182
Sample Output
JS>remove pseudol3 route
Related
Documentation
183
184
CHAPTER 28
185
186
CHAPTER 29
Shares
This chapter explains shares configuration for DDoS Secure and describes the available
advanced configuration commands.
show share
remove share
set share
Value
Description
gateway
IPADDRESS|none
config
yes|no
incident
yes|no
state
yes|no
required
yes|no
Related
Documentation
187
188
show share
Syntax
Description
Sample Output
JS>show share all
set share 10.1.1.192 gateway none config yes incident yes state yes required no
set share 10.1.1.191 gateway none config yes incident yes state no required no
Related
Documentation
189
remove share
Syntax
Description
Deletes the specified share. The <IPADDRESS> field should have a value that matches
an existing defined share IP address. If the IP address used does not match any of the
existing defined shares, the command is ignored.
It is also possible to delete all the defined shares. The command remove share all deletes
all configured shares but prompts for confirmation before the command is accepted.
NOTE: When the value all is used with the remove share command the user
is prompted if they are sure. This prompting can be turned off, which may be
of use for scripted configurations.
Sample Output
JS>remove share all
Are you sure [yes/no]? yes
JS>show share all
set share 10.1.1.192 gateway none config yes incident yes state yes required no
set share 10.1.1.191 gateway none config yes incident yes state no required no
JS>remove share 10.1.1.191
JS>apply
JS>show share all
set share 10.1.1.192 gateway none config yes incident yes state yes required no
Related
Documentation
190
set share
Syntax
Description
Defines the share. If all parameters are not present when defining a new share then any
unspecified parameters are automatically set to no.
Sample Output
JS>show share all
set share 10.1.1.192 gateway none config yes incident yes state yes required no
JS>set share 10.1.1.191 config yes
JS>apply
JS>show share all
set share 10.1.1.192 gateway none config yes incident yes state yes required no
set share 10.1.1.191 gateway none config yes incident no state no required no
Related
Documentation
191
192
CHAPTER 30
SNMP
This chapter explains SNMP for DDoS Secure and describes the available advanced
configuration commands.
show snmp
set snmp
Value
Description
trap
IPLIST|none
rocommunity
COMMUNITY
trapcommunity
COMMUNITY
syslocation
TEXT
syscontact
TEXT
Related
Documentation
193
show snmp
Syntax
Description
show snmp
Displays the current SNMP settingsthe trap destination address, the read-only
community string, the trap community string, the system location reference name, and
the contact information for the system administrator.
Sample Output
JS>show snmp
set snmp trap 192.168.1.15 rocommunity public trapcommunity trapcom
syslocation test-lab syscontact
[email protected]
Related
Documentation
194
set snmp
Syntax
Description
Adjusts the values of the SNMP trap address trap, the read-only community string
rocommunity, the snmpcommunity string trapcommunity, the system location string
syslocation, and the system admin contact syscontact.
Sample Output
JS>show snmp
set snmp trap 192.168.1.15 rocommunity public trapcommunity public
syslocation test-lab syscontact [email protected]
JS>set snmp syslocation DDoS Secure appliance test lab
JS>apply
JS>show snmp
set snmp trap 192.168.1.15 rocommunity public trapcommunity public
syslocation DDoS Secure appliance test lab syscontact
[email protected]
NOTE: Although set snmp allows the changing of both SNMP remote alerting
and SNMP querying related settings, it does not change the security access
settings to the appliance management interface. It is important that the set
access snmp command also be used to ensure that trusted IP addresses have
access to the appliance to be allowed to make SNMP queries.
Related
Documentation
195
196
CHAPTER 31
Structured Syslog
This chapter explains structured syslog for DDoS Secure and describes the available
advanced configuration commands.
show structured
set structured
Value
Description
ip
IPLIST|none
The IP address to which DDoS Secure will send structured syslog messages.
format
welf|leef|cef
facility
SYSFACILITY
The syslog facility to which messages will be sent. If no previous facility has
been defined and this parameter is not specified then the default daemon
facility will be used.
priority
SYSPRIORITY
Related
Documentation
197
show structured
Syntax
Description
show structured
Sample Output
JS>show structured
set structured ip 192.168.1.99 format leef facility local0 priority info
Related
Documentation
198
set structured
Syntax
Description
Related
Documentation
Sets the structured syslog configuration, which is handled in the same was as ordinary
syslog configuration.
199
200
CHAPTER 32
Syslog
This chapter explains syslog for DDoS Secure and describes the available advanced
configuration commands.
show syslog
set syslog
Value
Description
ip
IPLIST|none
facility
SYSFACILITY
priority
SYSPRIORITY
Related
Documentation
201
show syslog
Syntax
Description
show syslog
Sample Output
JS>show syslog
set syslog ip 192.168.1.15 facility local5 priority info
Related
Documentation
202
set syslog
Syntax
Description
Sets the syslog protocol. The DDoS Secure appliance has three syslog configuration
settings, but the only one that must be configured for messages to be sent is the IP
address of the remote syslog server.
The appliance will send syslog messages to the log file that are priority or higher.
Sample Output
JS>set syslog ip 192.168.0.10
JS>apply
JS>show syslog
set syslog ip 192.168.0.10 facility daemon priority info
Related
Documentation
203
204
CHAPTER 33
show timeout
set timeout
Value
Default Value
Sends Keepalive
Sends RST on
Session End
syn
STATETIMEOUT|default
10 seconds
s-a
STATETIMEOUT|default
7 seconds
Yes
s-s
STATETIMEOUT|default
10 seconds
ack
STATETIMEOUT|default
60 seconds
Yes
p-a
STATETIMEOUT|default
60 seconds
Yes
get
STATETIMEOUT|default
15 minutes
Yes
est
STATETIMEOUT|default
15 minutes
Yes
f1s
STATETIMEOUT|default
3 minutes
Yes
Yes
f2s
STATETIMEOUT|default
3 minutes
Yes
Yes
f3s
STATETIMEOUT|default
70 seconds
205
Value
Default Value
Sends Keepalive
Sends RST on
Session End
f-f
STATETIMEOUT|default
70 seconds
Yes
f1d
STATETIMEOUT|default
3 minutes
Yes
Yes
f2d
STATETIMEOUT|default
3 minutes
Yes
Yes
f3d
STATETIMEOUT|default
70 seconds
cls
STATETIMEOUT|default
70 seconds
rst
STATETIMEOUT|default
30 seconds
r-c
STATETIMEOUT|default
30 seconds
unk
STATETIMEOUT|default
70 seconds
spf
STATETIMEOUT|default
10 seconds
sif
STATETIMEOUT|default
10 seconds
gets
STATETIMEOUT|default
2 minutes
ack80
STATETIMEOUT|default
20 seconds
Yes
url
STATETIMEOUT|default
10 seconds
f2d80
STATETIMEOUT|default
20 seconds
Yes
swin
STATETIMEOUT|default
2 minutes
NOTE: Sends RST on session end is applicable only if, source and destination
IP addresses of the session are both in defending mode.
Related
Documentation
206
show timeout
Syntax
Description
Displays the current state timeouts that do not have some of the default values, or all
the default values.
Sample Output
JS>show timeout all
No timeout changes
Related
Documentation
207
set timeout
Syntax
Description
Sets the timeout value. The <PARAMETER> <VALUE> pair is taken from the timeout
parameters.
Sample Output
JS>set timeout s-a 25
JS>apply
JS>show timeout all
set timeout s-a 25
Related
Documentation
208
CHAPTER 34
SSL Decryption
This chapter explains SSL decryption for DDoS Secure and describes the available
advanced configuration commands.
show decryptkeys
remove decryptkeys
SSL Decryption
You can set up the DDoS Secure appliance to decrypt SSL data streams for analyzing
the HTTP contents for attack mitigation.
To decrypt SSL data streams, upload the private keys through the Web interface, and
then associate these private keys with protected IPs and potentially different domains
on the protected IP.
This method for the decryption is not man-in-the-middle, so it is not possible to decrypt
data streams that make use of the Perfect Forward Secrecy (PFS) algorithms.
Related
Documentation
209
show decryptkeys
Syntax
Description
show decryptkeys<all|IPADDRESS>
Displays the decrypt key configuration. Each decrypt key definition can be configured as
either default or specific. For default definitions, the ports and private key to be used for
the decryption of SSL traffic to and from a protected IP address are specified. For a
specific definition, a domain name and private key combination are applied in addition
to the default configuration. An associated default configuration is required for a specific
configuration for a protected IP address to exist.
Sample Output
JS>show decryptkeys all
nodle.pem
set decryptkeys default protected 192.168.1.189 ports 443 privatekey server.com.pem
set decryptkeys default protected 192.168.1.37 ports 443 privatekey f5-private.key
set decryptkeys specific protected 192.168.1.37 domain f5.com privatekey
f5-private.key
set decryptkeys specific protected 192.168.1.37 domain testserver.com privatekey
testserver.pem
set decryptkeys specific protected 192.168.1.37 domain server.com privatekey
tserver.pem
set decryptkeys default protected 192.168.1.156 ports 443 privatekey test_pkey.pem
set decryptkeys default protected 192.168.1.157 ports 443 privatekey 157.pem
set decryptkeys default protected 192.168.21.125 ports 443 privatekey tserver.pem
The configurations associated with a single IP address can be shown by specifying the
protected IP address as part of the command, as shown in the following example.
JS>show decryptkeys 192.168.1.37
set decryptkeys default protected 192.168.1.37 ports 443 privatekey f5-private.key
set decryptkeys specific protected 192.168.1.37 domain f5.com privatekey
f5-private.key
set decryptkeys specific protected 192.168.1.37 domain testserver.com privatekey
testserver.pem
set decryptkeys specific protected 192.168.1.37 domain server.com privatekey
tserver.pem
JS>show decryptkeys stats
210
:
:
592
1241
:
:
:
:
:
:
:
:
:
:
:
:
0
0
0
0
0
15
0
0
0
0
0
0
Decryption Failed
Session Resume Support Disabled
Session Resumed But Not Found
Unknown Message Type / Corrupt Header
Unrecognised Protocol Version
Invalid Record Size / Corrupt Header
Session setup not seen
Not Configured for SSL Inspection
SSLv2 Inspection Not Supported
Failed Exchange Allocation
Failed Decrypt Allocation
Failed Deflate Allocation
Failed Deflater Allocation
Failed Record Allocation
Failed Decoder Allocation
Related
Documentation
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
211
Description
Output Fields
Set the ports and default private key for SSL inspection associated with the given
protected IP address. The private key must be uploaded with the GUI beforehand and
referenced by the filename.
Table 43 on page 212 describes the decryptkeys default parameters.
Value
Description
protected
IPADDRESS
ports
PORTLIST
privatekey
PRIVATEKEY
Sample Output
JS>set decryptkeys default protected 192.168.1.40 ports 443 privatekey testserver.pem
Related
Documentation
212
Description
Output Fields
Adds a specific domain for SSL inspection in association with the protected IP address.
The IP address must already have a default definition and the private key must be
uploaded with the GUI beforehand, referenced by filename.
Table 44 on page 213 lists the decryptkeys specific parameters.
Value
Description
protected
IPADDRESS
domain
DOMAIN
privatekey
PRIVATEKEY
Sample Output
JS>set decryptkeys specific protected 192.168.1.40 domain testitnow.com privatekey
privatekey.pem
Related
Documentation
213
remove decryptkeys
Syntax
Description
Sample Output
JS>remove decryptkeys 192.168.1.40
Related
Documentation
214
CHAPTER 35
Traffic Interception
This chapter explains traffic interception for DDoS Secure and describes the available
advanced configuration commands.
show wrapper
Value
Description
enable
yes|no
respcode
CODE
http_ports
PORTLIST|none
https_ports
PORTLIST|none
vlan
VLAN
215
Value
Description
gtp
yes|no
gre
yes|no
ip6in4
yes|no
Related
Documentation
216
show wrapper
Syntax
Description
Sample Output
JS>show wrapper all
set wrapper blocked country enable yes respcode 200 http_ports 80
https_ports none
set wrapper blocked ip enable yes respcode 200 http_ports 80 https_ports none
Related
Documentation
217
Description
Sample Output
JS>set wrapper blocked country enable yes http_ports 80
JS>apply
JS>show wrapper all
set wrapper blocked country enable yes respcode 404 http_ports 80
https_ports none
set wrapper unwrap gtp no gre yes ip6in4 yes
Related
Documentation
218
Related
Documentation
Sets the traffic that match the specific VLAN tag to be treated as if flowing in the opposite
direction.
219
Related
Documentation
220
Defines the IP address protocols that are to be unwrapped and to inspect the IP address
packets that are contained within.
CHAPTER 36
Usage
This chapter explains usage configuration for DDoS Secure and describes the available
advanced configuration commands.
show usage
set usage
Value
Description
hwid
HARDWARE-ID
bandwidth
BANDWIDTH
bgprules
1K|2K|4K|8K
protected
2|4|8|16|32|64|128|256|512|1K|
2K|4K|8K|16K|32K|64K
portals
2|4|8|16|32|64|128|256
filter
32|64|128|256|512|1K|2K|4K|8K|16K
ratelimiters
2K|4K|8K|16K|32K|64K|128K|
256K|512K|1M|2M|4M
221
Value
Description
tracked
128K|256K|512K|1M|2M|4M
|8M|16M|32M
macs
128|256|512|1K|2K|4K|8K|16K|32K
tcps
128K|256K|512K|1M|2M|4M
udps
128K|256K|512K| 1M|2M|4M
icmps
2K|4K|8K|16K|32K|64K
others
2K|4K|8K|16K|32K|64K
frags
2K|4K|8K|16K|32K
ftps
512|1K|2K|4K|8K|16K
ssldecoders
512|1K|2K|4K|8K|16K
sslsessions
512|1K|2K|4K|8K|16K
sslhsbuffers
512|1K|2K|4K|8K|16K
sslbbuffers
512|1K|2K|4K|8K|16K
sslkx
512|1K|2K|4K|8K|16K
Related
Documentation
222
show usage
Syntax
Description
show usage
Sample Output
JS>show usage
set usage hwid 00:80:B4:07:CE:25 bandwidth 1G protected 64 portals 16 filters
256 ratelimiters 4K macs 1K tracked 2M tcps 512K udps 64K icmps 8K others 8K
frags 8K ftps 1K httpparsers 1K bfsrules 2K ssldecoders 1K sslsessions 1K
sslhsbuffers 32 sslbbuffers 256 sslkx 1K
Related
Documentation
223
set usage
Syntax
Description
Related
Documentation
224
JS>set usage
hwid Appliance hardware ID (if for another machine)
[bandwidth <BANDWIDTH>]
[protected <2|4|8|16|32|64|128|256|512|1K|2K|4K|8K|16K|32K|64K>]
[portals <2|4|8|16|32|64|128|256>]
[filters <32|64|128|256|512|1K|2K|4K|8K|16K>]
[ratelimiters <2K|4K|8K|16K|32K|64K|128K|256K|512K|1M|2M|4M>]
[tracked <128K|256K|512K|1M|2M|4M|8M|16M|32M>]
[macs <128|256|512|1K|2K|4K|8K|16K|32K>]
[tcps <128K|256K|512K|1M|2M|4M>]
[udps <128K|256K|512K|1M|2M|4M>]
[icmps <2K|4K|8K|16K|32K|64K>]
[others <2K|4K|8K|16K|32K|64K>]
[frags <2K|4K|8K|16K|32K>]
[ftps <512|1K|2K|4K|8K|16K>]
[httpparsers <1K|2K|4K|8K|16K|32K|64K|128K|256|512K|1M|2M>]
[ssldecoders <512|1K|2K|4K|8K|16K>]
[sslsessions <512|1K|2K|4K|8K|16K>]
[sslhsbuffers <512|1K|2K|4K|8K|16K>]
[sslbbuffers <512|1K|2K|4K|8K|16K>]
[sslkx <512|1K|2K|4K|8K|16K>]
CHAPTER 37
User Management
This chapter explains user management configuration for DDoS Secure and describes
the available advanced configuration commands.
show user
remove user
set user
Users who can access the RESTful interface through an API key.
A user can only be one of the basic types, which is determined by the rest parameter.
Table 47 on page 225 describes the user access permission details.
Value
administrator
operator
Has full access to change any configuration entry other than user account configuration.
Limited read-only access to user information.
guest
sso
225
Table 48 on page 226 table describes the user parameters and their formats.
Value
Description
user
USERNAME
password
PASSWORD
perms
PERMS
rest
yes|no
apikey-digest
APIKEYDIGEST
Related
Documentation
226
show user
Syntax
Description
Displays the complete list of the configured user accounts. If the user using the command
has administrator or SSO permissions then the encrypted passwords or API digest keys
are also shown along with the account name and permissions.
Sample Output
JS>show user all
set user user password $1$ehL5yai/$ewwyx00qx3VIdKXITvRUG. perms administrator
set user test password $1$wLh6yBh0$vmth1CmyrvQDg6ZKDTuqn. perms operator
Users with operator or guest permissions will be shown the list of users without the
passwords.
JS>show user all
set user user perms administrator
set user test perms operator
Alternatively, the details of a specific user can be shown if the username is specified
instead of the parameter all.
This command is not available to guest accounts.
JS>show user test
set user test password $1$wLh6yBh0$vmth1CmyrvQDg6ZKDTuqn. perms operator
Related
Documentation
227
remove user
Syntax
Description
Deletes a specific user. Only administrators or SSOs can remove users, and they cannot
delete themselves or change their own permission status.
This command can also be used to delete all current users. To do this the parameter
value all is used instead of a user account name. Administrators or SSOs can use remove
user all but the command will not remove the logged in user account. When deleting all
users the command will ask for confirmation.
Related
Documentation
228
set user
Syntax
Description
Creates a new user or modifies an existing one. When creating a new user the password
or rest must be specified. If the permissions are not specified then the permissions for
the guest is assumed.
For an existing user account the set user command can be used to modify the password,
rest mode, or permissions.
When specifying the password either the encrypted form or a plain text password may
be entered. An encrypted password, in the form of an MD5 hashed key, is recognized by
the password starting with $1$.
NOTE:
Related
Documentation
229
230
CHAPTER 38
System Maintenance
This chapter explains system maintenance configuration for DDoS Secure and describes
the available advanced configuration commands.
system restart
system restart_clear
system shutdown
system reboot
system powerdown
system factoryreset
system config_reset
system clear_custom
system check
system helpdesk
231
system restart
Syntax
Description
Related
Documentation
232
system restart
Restarts the DDoS Secure appliance software but does not restart the underlying
operating system.
system restart_clear
Syntax
Description
Related
Documentation
system restart_clear
Restarts the DDoS Secure appliance software but does not restart the underlying
operating system. All tables are cleared out, so the DDoS Secure appliance will need to
re-learn everything.
233
system shutdown
Syntax
Description
Related
Documentation
234
system shutdown
Shuts down the DDoS Secure appliance engine only. The underlying operating system
continues to run as does the GUI/CLI.
system reboot
Syntax
Description
Related
Documentation
system reboot
235
system powerdown
Syntax
Description
Related
Documentation
236
system powerdown
system factoryreset
Syntax
Description
system factoryreset
Resets the DDoS Secure appliance configuration back to the factory default. This includes
things such as IP addresses of the management interface and defined users.
NOTE: The DDoS Secure appliance will power off following the factory reset.
Use system config_reset to prevent a power off.
Related
Documentation
237
system config_reset
Syntax
Description
system config_reset
Resets the DDoS Secure appliance configuration back to the factory default.
NOTE: This is same as system factoryreset but does not change the
management IP and power off the appliance.
Related
Documentation
238
system clear_custom
Syntax
Description
Related
Documentation
system clear_custom
239
system check
Syntax
Description
Related
Documentation
240
system check
system helpdesk
Syntax
Description
Related
Documentation
system helpdesk
Writes a copy of the HelpDesk file and the Hardware Diagnostics file to a formatted
external USB drive.
241
242
CHAPTER 39
show terminal
set terminal
Terminal Configuration
Table 49 on page 243 describes the terminal configuration parameters and their formats.
Value
Description
pause
yes|no
confirmations
yes|no
lines
LINES
cols
COLS
term
TERMTYPE
Related
Documentation
243
244
show terminal
Syntax
Description
show terminal
Sample Output
JS>show terminal
set terminal pause yes confirmations yes lines 24 cols 80 term vt100
Related
Documentation
245
set terminal
Syntax
Description
Sets the terminal settings for the current CLI session. At the start of each new session
the default values will be restored.
Sample Output
JS>set terminal pause yes
Terminal pause is now ON
JS>set terminal pause no
Terminal pause is now OFF
Related
Documentation
246
CHAPTER 40
stats view
show version
ping
247
stats view
Syntax
Description
Related
Documentation
248
stats view
Displays the graphical output on the screen. Entering any key gives a list of all the available
display options. The screen size and output format is based on terminal settings described
in the chapter, Settings for Command-Line Environment.
show version
Syntax
Description
show version
Displays the current software release along with other version details about the unit.
Sample Output
JS>sh version
DDoS Secure Code Version:
DDoS Secure Code Base:
DDoS Secure Build Date:
CD Base Image:
Actual Memory Size:
Actual Number of CPUs:
Serial No:
Hardware ID:
Platform:
Last Restart:
Licensed Throughput:
Memory To Use:
CPUs To Use:
Protected IPs Supported:
Tracked IPs Supported:
Portals Supported:
Filters Supported:
Rate Limiters Supported:
MAC Entries Supported:
TCP Entries Supported:
UDP Entries Supported:
ICMP Entries Supported:
Other IP Entries Supported:
Fragment Entries Supported:
FTP Entries Supported:
SSL Decoders Supported:
SSL Sessions Supported:
SSL Handshake Buffers:
SSL Block Buffers:
SSL Key Exchanges Supported:
5.14.1-0
CENTOS_6_3
201305201820GMT
5.14.1-0
31.3G
16
A1RYMW1
90:B1:1C:2A:A3:28
J-DDOS-SEC-AP2
Tue May 21 16:54:09 2013
10G
31G
16
64K
32M
256
4K
4K
16K
4M
512K
64K
64K
32K
8K
512K
512K
1K
2K
512K
Description
CD Base Image
249
Description
Serial No
Hardware ID
Platform
Last Restart
Licensed Throughput
Memory To Use
CPUs To Use
Tracked IP addresses supported and the maximum number of Internet client IP addresses
that can be tracked.
Portals Supported
Filters Supported
250
Description
It is possible to update the supported counts with the set usage command.
Related
Documentation
251
ping
Syntax
Description
ping <IPADDRESS>
Provides the ability to ping an IP address that is routable over the management or
DataShare interfaces for troubleshooting purposes.
Sample Output
JS>ping 192.168.0.4
PING 192.168.0.4 (192.168.0.4) 56(84)
64 bytes from 192.168.0.4: icmp_seq=1
64 bytes from 192.168.0.4: icmp_seq=2
64 bytes from 192.168.0.4: icmp_seq=3
64 bytes from 192.168.0.4: icmp_seq=4
64 bytes from 192.168.0.4: icmp_seq=5
bytes of data.
ttl=64 time=1.46 ms
ttl=64 time=0.411 ms
ttl=64 time=0.359 ms
ttl=64 time=0.401 ms
ttl=64 time=0.392 ms
--- 192.168.0.4 ping statistics --5 packets transmitted, 5 received, 0% packet loss, time 4001ms
rtt min/avg/max/mdev = 0.359/0.605/1.466/0.431 ms
JS>
Related
Documentation
252
CHAPTER 41
This then generates a (quagga) configuration file on the appliance which is similar to the
following (ip prefix-list not-ours deny are the local DDoS Secure appliance IP addresses).
NOTE: This is not the same as Configuring BGP Flow Spec, which does not
use the Quagga process.
Related
Documentation
253
Related
Documentation
254
!
ip prefix-list localdeny seq 5 permit 10.10.10.1/32
!
ip prefix-list scrubb seq 5 permit F.G.H.0/21 le 32
!
route-map scrubbing permit 10
match ip address prefix-list scrubb
match community 99 exact-match
set local-preference 200
set community no-advertise
set ip next-hop W.X.Y.Z
!
route-map scrubbout permit 10
match ip address prefix-list localdeny
Related
Documentation
Rerouting Trigger
These are based on the thresholds defined in the portal definition, and then applied to
any IP address within that portal.
Table 51 on page 255 describes the portal definitions that will be actioned if BGP is enabled.
Description
rerouteminpkts
Packet rate has to remain below this threshold for at least lower timer seconds for the
routing trigger to be removed.
reroutemaxpkts
rerouteminspeed
Speed has to remain below this threshold for at least lower timer seconds for the routing
trigger to be removed.
reroutemaxspeed
255
Sample Output
JS>set chassis reroute ip 1.2.3.4
JS>apply
Related
Documentation
256
CHAPTER 42
Filenaming Convention
There are a series of template files named blockedcountryXXXXYYYYZZZZ.tmpl or
blockedcountryXXXXYYYYZZZZ.tmpl, where:
257
XXXX optionally can be <DDoS Secure appliance portal name> where DDoS Secure
appliance portal name is one of the optional user defined DDoS Secure appliance
portals.
YYYY optionally can be CCC where CCC is the 3 letter country code.
NOTE: Any references to external (to the page) information (for example:
<img>, <frame>, href= and so on.) should be used with care, as they cannot
be hosted on any of the protected websites as access to the references will
also get (recursively) blocked.
Table 52 on page 258 describes keywords that can be recognized and replaced.
Description
%HOST%
%URL%
URL from the GET/POST/HEAD request. The host: header entry will be prefixed when
appropriate.
%CCC%
Country name.
%IP%
Requesting IP address.
%TIME%
Current time of day (local time) in DAY MMM NNN HH:MM:SS YEAR format. For example:
Wed Nov 30 21:49:08 2013).
258
Related
Documentation
To delete a .tmpl file, repeat the line above, but without the file in question and re-install
the bc.upg patch.
This server will handle both HTTP and HTTPS connections. For HTTPS connections,
either a self-signed certificate or a CA signed certificate can be uploaded by including
the file redirect.pem (which includes both the public and private key) in the bc.upg file.
Related
Documentation
Related
Documentation
259
Add 1.2.3.4 to allow country block override list and verify that the normal page is
reached.
set block cignoreip 1.2.3.4
NOTE: If the DDoS Secure appliance Engine is in Logging mode, then this
warning page will not get generated as all traffic is passed through anyway
even if a country is blocked.
260
PART 3
Appendix
261
262
APPENDIX A
Parameter Definitions
This appendix defines the syntax for the variable values that are used throughout this
guide.
Example
Description
ACTION
discard
ACTIONVALUE
100K
ALERTINTERVAL
ASLIST
ASNUMBER
6523
AUTO-BACKLOG
auto-100
System rebooted.
AUTO-CONNECTIONS
auto-500
AUTO-CONNRATE
auto-500
AUTO-GETS
auto-500
BACKLOG
100
Software upgraded.
BANDWIDTH
2G
BIAS
10
Configuration changed.
263
Example
Description
COLS
80
CONNECTIONS
500
CONNRATE
200
COUNTRIES
all,!USA
COUNTRYCODE
USA
DOMAIN
mydomain.com
A domain name.
DSCP
DSCPLIST
3 - 4,8
DSCPRANGE
3-4
DISKNAME
/dev/sdb
DROPRATE
30
EMAILADDRESS
MAILADDRESSES
[email protected],
[email protected]
EREGEX
^/index\.(asp|htm)$
Posix EREGEX.
FCMODE
none
FILTERNAME
Inweb
FILTERS
10
FLOWFLUSH
FREQUENCY
264
Example
Description
GETS
200
GROUPINGID
HAMODE
active-standby
HARDWARE-ID
00:01:02:03:04:05
HEADER
X-Forwarded-For:
ICMPCODE
ICMPCODELIST
3 - 4,8
ICMPCODERANGE
3-4
ICMPTYPE
ICMPTYPELIST
3 - 4,8
ICMPTYPERANGE
3-4
ICMP6TYPE
128
ICMP6TYPELIST
128 - 129,131
ICMP6TYPERANGE
128 - 129
IPADDRESS
192.168.1.1
IPBLOCK
192.168.0.3-192.168.0.9
IPLIST
192.168.1.1,192.158.0.3
265
Example
Description
IPMULTI
225.0.0.1
A multi-cast IP address.
IPNETWORK
192.168.2.0/24
IPNETWORK
192.168.3.0/255.255.255.0
IPRANGE
10.1.1.1,10.1.2.0/24
10.1.3.0/255.255.255.0,
192.168.0.3-192.168.0.9
LENGTH
100
LENGTHLIST
100 - 200,300
LENGTHRANGE
100 - 200
LICENSE-KEY
78c683db-2de8514486424180-d868a0894c329901-205a4986-075f8d0c
LIFETIME
60
LIMIT
15
LINES
24
LINKMODE
100full
MAC
00:02:04:06:08:10
MODE
266
defensive
v VLAN
q QINQ
Example
Description
MODEIP
defensive
MODEPORTAL
defensive
MTU_SIZE
1500
NETMASK
255.255.255.0
PASSWORD
mypassword
PERMS
administrator
PKTS
3.7K
PORT
22
PORTALNAME
portal123
PORTLIST
22, 35 - 40
PORTRANGE
35 - 40
PRIORITY
PROTECTED
10
PROTECTEDNAME
webserver1
PROTOCOL
47
PROTOCOLLIST
22, 35 - 40
PROTOCOLRANGE
50 - 51
267
Example
Description
RATE
100
REGEX
^/index.asp$
RESPCODE
503
SECRET
serverPassword
SERVERNAME
webserver1
SPEED
10M
STATETIMEOUT
30
STRING
/index.asp
SYSFACILITY
local1
One of auth, cron, daemon, kern, lpr, mail, new, user, uucp,
syslog, local0, local1, local2, local3, local4, local5, local6,
or local7. The receiving Syslog server must be configured
to accept and redirect the Syslog information based on
SYSFACILITY and SYSPRIORITY.
SYSPRIORITY
info
TEMPLATEP
1000
TEMPLATEM
60
TERMTYPE
vt220
TEXT
THRESHOLD
10
THRESHOLDTIME
60
TIMEOUT
268
Example
Description
TIMESTRING
24-jan-03 16:00:00
yyyy-mm-ddThh:mm:ss (preferred)
dd-mmm-yy hh:mm:ss
TIMEZONE
Europe/London
TPROTOCOL
lcp
TSERVICE
Webscreen
URL
http://f.t.com/file.txt
USERNAME
user123
VALUE
100
VLANSDEF
v1024,m1234
Specific Area
Description
10000full
Interface
1000full
Interface
100full
Interface
100half
Interface
10full
Interface
10half
Interface
active-standby
Appliance
active-standby-fs
Appliance
269
Specific Area
Description
administrator
User
alert
Syslog
Logging Level.
all
auth
Syslog
Logging Facility.
auto
Interface
autodetected
bl
Item it to be black-listed.
bl+
DNS
broadcast
bypass-fs-hardware
Appliance
bypass-software
Appliance
crit
Syslog
Logging Level.
cron
Syslog
Logging Facility.
daemon
Syslog
Logging Facility.
debug
Syslog
Logging Level.
default
Protected
default
defending
defending-nostatelearn
Appliance
emerg
Syslog
Logging Level.
err
Syslog
Logging Level.
full
Interface
guest
User
270
Specific Area
Description
indeterminate
Protected
info
Syslog
Logging Level.
intercept
Protected
kern
Syslog
Logging Facility.
load-share-mc
Appliance
local0
Syslog
Logging Facility.
local1
Syslog
Logging Facility.
local2
Syslog
Logging Facility.
local3
Syslog
Logging Facility.
local4
Syslog
Logging Facility.
local5
Syslog
Logging Facility.
local6
Syslog
Logging Facility.
local7
Syslog
Logging Facility.
logging
logging-nokeepalive
Appliance
logging-tap
Appliance
lpr
Syslog
Logging Facility.
Syslog
Logging Facility.
multicast
news
Logging Facility.
no
none
271
Specific Area
Description
notice
Syslog
Logging Level.
notreported
Protected
operator
User
User role that has full rights, apart from configuring users.
rx_only
Interfaces
sso
User
standalone
Appliance
standalone-nofs
Appliance
tx_only
Interfaces
user
Syslog
Logging Facility.
uucp
Syslog
Logging Facility.
warning
Syslog
Logging Level.
wl
yes
Unrestricted.
Related
Documentation
272
APPENDIX B
Range
Description
Standard
Administration
Messages
1001 - 1xxx
Includes Health Check messages, sent out at 5-minute intervals, which contain
information about licensing usage.
Appliance Defense
States
2001 - 2xxx
273
Range
Description
Incidents
3001 - 3xxx
a. An Incident Active message is sent out when an attack exceeds threshold alert and
that has been ongoing for longer than the value of incidents threshold:
1.
c. An Incident Active Complete message is sent out when the incident is either idle or
closed down because its lifetime has expired. If an attack is still active after the
incident is closed down and the conditions in Step i are met, a new incident with a
new incident ID is created.
d. An Incident Detail message is sent only if it is configured with the CLI command set
debugging incidentdetail yes (the default is no). Otherwise, only summary Incident
messages are sent.
e. An Incident Detail message includes the top 10 IPs, as well as a remaining entry
where the IP address is 0.0.0.0.
Worst Offenders
4001 - 4xxx
5001 - 5xxx
6001 - 6xxx
These messages are sent out every time there is a configuration file change that
affects the permanently defined white-list or black-list definitions.
274
Event Types
Table 56 on page 275 through Table 60 on page 289 describe event types.
Event Name
Description
1001
User Login
User logs in to the system. Reports valid and failed login attempts.
1002
User Logout
1003
Create User
1004
Modify User
1005
Delete User
1006
Power Off
1007
Reboot
System rebooted.
1008
1009
1010
1011
Factory Reset
1012
Software Upgrade
Software upgraded.
1013
Configuration Changed
Configuration changed.
1014
Logging State
1015
1016
Defending State
1017
1018
IPMI
IPMI messages.
1019
1020
1021
1022
275
Event Name
Description
1023
Interface Restart
1024
HA State Standalone
1025
1026
1027
1028
Administrative Information
Administrative messages.
1029
SSL
SSL messages.
1030
Configuration
1031
Dropped
1032
Debug
Debug information.
1033
Watchdog
Watchdog messages.
1034
Health Check
Event Name
Description
2001
2002
2003
2004
New Configuration
2005
Not Licensed
2006
The appliance has run out of internal table space for MAC
addresses. The oldest (by use) entry has been dropped.
276
Event Name
Description
2007
The appliance has run out of internal table space for protected
IP addresses. This usually indicates that your Internet and
protected cable connections are swapped. If not, then your
appliance is trying to protect too many protected IPs and the
network topology needs to be reviewed, or a feature upgrade
should be purchased (if available).
2008
The appliance has run out of internal table space for active
Incidents. The oldest (by use) entry has been dropped.
2009
The appliance has used all the internal table space for TCP
connections. The entries that are not required are removed to
create space for the next TCP connection. This should normally
happen only when defending against a large-scale attack.
2010
The appliance has used up all the internal table space for UDP
sessions. The entries that are not required are removed to create
space for the next UDP session. This should normally happen
only when defending against a large-scale attack.
2011
The appliance has run out of internal table space for ICMP
sessions. This table size is deliberately restricted. The oldest (by
use) entry has been dropped. This should normally happen only
when defending against a large-scale attack.
2012
The appliance has used up all the internal table space for IP
protocol sessions. The entries that are not required are removed
to create space for the next IP protocol session. This should
normally happen only when defending against a large-scale
attack.
2013
The appliance has run out of internal table space for handling
fragments. This table size is deliberately restricted. The oldest
(by use) entry has been dropped.
2014
The appliance has used up all the internal table space for tracking
FTP connections. The entries that are not required are removed
to create space for the next FTP connection. This should normally
happen only when defending against a large-scale attack.
2015
The appliance has used up all the internal space for tracking IP
addresses that are being temporarily black-listed. Any inactive
black-listed IP address will be removed from the list.
277
Event Name
Description
2016
The DDoS Secure appliance has detected the same source MAC
address in use on both the I-I/F and P-I/F interfaces. Bypass
packets are not passed through the appliance when it is in
defensive mode. This means that there is either an alternative
data path around the appliance, or a topology change has placed
a previously determined MAC address on the opposite side of
the appliance. In the event of a topology change the cached entry
can be modified by configuring the MAC address as either an
Internet or a protected gateway; or if not configured, the MAC
will be allowed to change sides automatically after 5 seconds.
2017
Internet-I/F N/C
2018
Protected-I/F N/C
2019
Management-I/F N/C
2020
Upgrading
2021
The appliance has run out of internal table space for handling
rate limiters. You cannot create any new rate limiters until the
existing ones expire.
2022
Routing Loop
The DDoS Secure appliance has detected that a packet that has
just been passed through the appliance is now returning back
through the appliance. This usually indicates that two routers,
one on either side of the appliance, have incorrectly determined
that traffic needs to be redirected through the opposite router to
get to a specific IP address.
2023
Forced Inactive
2024
State Learning
2025
Support Expired
2026
Sever Loading
278
Event Name
Description
2027
MAC Misconfigured
2028
2029
2030
2031
DataShare-I/F N/C
2032
Disk Failure
One of the disks has failed a SMART test and should be replaced
as soon as possible.
2033
PSU Failure
2034
Fan Failure
The system BIOS is reporting that there has been a fan failure,
or that the appliance is running in a hot environment. This needs
to be repaired as a soon as possible to prevent hardware
component failure.
2035
2036
Missing Partner
2037
BGP Misconfigured
The DDoS Secure appliance has detected a BGP session but the
server is excluded by the DDoS Secure appliance portal network
list.
2038
Event Name
Description
3001
Bandwidth
279
Event Name
Description
3002
Packet Rate
3003
3004
3005
3006
3007
3008
3009
3010
TCP packet has no state table entry and is not a SYN packet.
3011
TCP packet has a state table entry, but packet is out of state.
3012
3013
IP Attack Land
3014
3015
3016
3017
3018
3019
3020
3021
280
Event Name
Description
3022
3023
3024
3025
3026
3027
3028
3029
3030
3031
3032
3033
3034
3035
3036
3037
3038
3039
3040
3041
281
Event Name
Description
3042
3043
3044
3045
3046
3047
3048
3049
3050
3051
3052
3053
Overloaded IP Stall
3054
3055
3056
3057
3058
Internal table for MAC addresses is full. Oldest entry has been
expired.
3059
3060
282
Event Name
Description
3061
The same (source) MAC address has been seen on both sides of
the DDoS Secure appliance.
3062
The source and destination MAC address both reside on the same
side of the DDoS Secure appliance.
3063
3064
3065
3066
3067
3068
Overloaded IP Backlog
3069
3070
3071
3072
3073
Overloaded IP Threads
3074
3075
3076
3077
A MAC address has been configured for one side of the DDoS
Secure appliance, but this packet with this source MAC address
has been seen on the other side of the DDoS Secure appliance.
3078
283
Event Name
Description
3079
3080
3081
3082
3083
3084
3085
3086
3087
3088
Event Name
Description
4001
Bandwidth
4002
Packet Rate
4003
4004
4005
4006
4007
4008
4009
284
Event Name
Description
4010
TCP packet has no state table entry and is not a SYN packet.
4011
TCP packet has a state table entry, but packet is out of state.
4012
4013
IP Attack Land
4014
4015
4016
4017
4018
4019
4020
4021
4022
4023
4024
4025
4026
4027
4028
4029
285
Event Name
Description
4030
4031
4032
4033
4034
4035
4036
4037
4038
4039
4040
4041
4042
4043
4044
4045
4046
4047
4048
4049
286
Event Name
Description
4050
4051
4052
4053
Overloaded IP Stall
4054
4055
4056
4057
4058
Internal table for MAC addresses is full. Oldest entry has been
expired.
4059
4060
4061
The same (source) MAC address has been seen on both sides of
the DDoS Secure appliance.
4062
The source and destination MAC address both reside on the same
side of the DDoS Secure appliance.
4063
4064
4065
4066
4067
4068
Overloaded IP Backlog
287
Event Name
Description
4069
4070
4071
4072
4073
Overloaded IP Threads
4074
4075
4076
4077
A MAC address has been configured for one side of the DDoS
Secure appliance, but this packet with this source MAC address
has been seen on the other side of the DDoS Secure appliance.
4078
4079
4080
4081
4082
4083
4084
4085
4086
4087
288
Event Name
Description
4088
Event Name
Description
5002
5003
5004
GUI Request
5005
5006
5007
Event Name
Description
6001
6002
6003
6004
6005
6006
6007
6008
6009
289
Event Name
Description
6010
6011
Preferred Country
LEEF Extensions
Table 62 on page 290 describes the supported LEEF extensions parameter.
Description
Attribute Type
Attribute Limits
action
String
63
cat
String
1023
CurrentPps
Integer
0 to 4294967295
desc
String
255
devTime
Timestamp
devTimeFormat
String
dir
0 or 1
dst
dstPort
Integer
0 to 65535
end
String
255
290
Description
Attribute Type
Attribute Limits
entity
String
255
id
Incident ID.
String
255
identSrc
identHostName
String
255
msg
Associated message
String
255
myip
PeakBps
Integer
0 to 4294967295
PeakPps
Integer
0 to 4294967295
proto
String
255
resource
String
255
realm
String
255
sev
Integer
1-10
src
291
Description
Attribute Type
Attribute Limits
srcPort
Integer
0 to 65535
totalPackets
Integer
0 to 4294967295
usrName
String
255
url
String
255
Arcsight Extensions
Table 63 on page 292 describes the supported Arcsight Extensions parameter.
Description
Attribute Type
Attribute Limits
act
String
63
cat
String
1023
cnt
Integer
0 to 4294967295
cn1
Integer
0 to 4294967295
cn1Label
String
cn2
Integer
292
0 to 4294967295
Description
Attribute Type
cn2Label
String
cn3
Integer
cn3Label
String
cs1
String
255
cs1Label
String
255
cs2
String
255
cs2Label
String
255
c6a2
IPv6 address
c6a2Label
c6a3
c6a3Label
Attribute Limits
0 to 4294967295
IPv6 address
293
Description
Attribute Type
Attribute Limits
deviceDirection
0 or 1
deviceFacility
String
255
dpt
Integer
0 to 65535
dst
IPv6 Address
duser
String
dvc
dvchost
String
63
externalId
Incident ID.
String
255
msg
String
1023
proto
String
request
String
255
spt
Integer
0 to 65535
src
IPv4 Address
start
Time Stamp
255
General Messages
CEF Message Format
Apr 6 11:55:40 ws_192_168_0_189 CEF: 0|Juniper|DDoS Secure|5.13.2-2a|
1034|Health Check|4|deviceFacility=local6 msg=Peak Usage: Sat Apr 5 12:10:31
294
Incident Messages
Incident message Beginning Message
CEF Message Format
Apr 7 17:55:35 ws_192_168_0_189 CEF: 0|Juniper|DDoS Secure|5.13.2-2a|
3016|TCP Attack - Syn Flood|4|externalId=20140407/009107
cs1=111.91.236.136/-General-/IP cs1Label=Entitycs2=Backlog Queue
cs2Label=ResourcedeviceDirection=0 src=183.225.1.56 dst=111.91.236.136
proto=TCP dpt=80 cat=START start=Apr 07 2014 17:55:27 cn2=1545
cn2Label=PeakPps cnt=8201 act=NOTIFY
295
296
297
Multiline example:
Apr 17 17:12:45 ws_192_168_0_189 LEEF: 1.0|Juniper|DDoS Secure|5.13.2-2d|
6001|desc=Black List IP(s) sev=4 id=1397751165 msg=1.2.3.6/31,1.100.100.1,
1.100.101.1,1.100.102.1,1.100.103.1,1.100.104.1,1.100.105.1,1.100.106.1,1.100.107.1,
1.100.108.1,1.100.109.1,1.100.110.1,1.100.111.1,1.100.112.1,1.100.113.1,1.100.114.1,
1.100.115.1,1.100.116.1,1.100.117.1,1.100.118.1,1.100.119.1,1.100.120.1,1.100.121.1,
1.100.122.1,1.100.123.1,1.100.124.1,1.100.125.1,1.100.126.1,1.100.127.1,1.100.128.1,
1.100.129.1,1.100.130.1,1.100.131.1,1.100.132.1,1.100.133.1,1.100.134.1,1.100.135.1,
1.100.136.1,1.100.137.1,1.100.138.1,1.100.13139.1,1.100.140.1,1.100.141.1,1.100.142.1,
1.100.143.1,1.100.144.1,1.100.145.1,1.100.146.1,1.100.147.1,1.100.148.1,1.100.149.1,
1.100.150.1,1.100.151.1,1.100.152.1,1.100.153.1,1.100.154.1,1.100.155.1,1.100.156.1,
1.100.157.1,1.100.158.1,1.100.159.1,1.100.160.1,1.100.161.1,1.100.162.1,1.100.163.1,
1.100.164.1,1.100.165.1,1.100.166.1,1.100.167.1,1.100.168.1,1.100.169.1,1.100.170.1,
1.100.171.1,1.100.172.1,1.100.173.1
Apr 17 17:12:45 ws_192_168_0_189 LEEF: 1.0|Juniper|DDoS Secure|5.13.2-2d|
6001|desc=Black List IP(s) sev=4 id=1397751165 msg=1.100.174.1,1.100.175.1,
1.100.176.1,1.100.177.1,1.100.178.1,1.100.179.1,1.100.180.1,
1.100.181.1,1.100.182.1,1.100.183.1,1.100.184.1,1.100.185.1,1.100.186.1,
1.100.187.1,1.100.188.1,1.100.189.1,1.100.190.1,1.100.191.1,1.100.192.1,1.100.193.1,
1.100.194.1,1.100.195.1,1.100.196.1,1.100.197.1,1.100.198.1,1.100.199.1,1.100.200.1,
1.100.201.1,1.100.202.1,1.100.203.1,1.100.204.1,1.100.205.1,1.100.206.1,1.100.207.1,
1.100.208.1,1.100.209.1,1.100.210.1,1.100.211.1,1.100.212.1,1.100.213.1,1.100.214.1,
1.100.215.1,1.100.216.1,1.100.217.1,1.100.218.1,1.100.219.1,1.100.220.1,1.100.221.1,
1.100.222.1,1.100.223.1,1.100.224.1,1.100.225.1,1.100.226.1,1.100.227.1,1.100.228.1,
1.100.229.1,1.100.230.1,1.100.231.1,1.100.232.1,1.100.233.1,1.100.234.1,1.100.235.1,
1.100.236.1,1.100.237.1,1.100.238.1,1.100.239.1,1.100.240.1,1.100.241.1,1.100.242.1,
1.100.243.1,1.100.244.1,1.100.245.1,1.100.246.1,1.100.247.1,1.100.248.1
Apr 17 17:12:45 ws_192_168_0_189 LEEF: 1.0|Juniper|DDoS Secure|5.13.2-2d|
6001|desc=Black List IP(s) sev=4 id=1397751165 msg=1.100.249.1,1.100.250.1,
1.100.251.1,1.100.252.1,1.100.253.1,1.100.254.1,1.100.255.1,4.5.6.7
Related
Documentation
298
APPENDIX C
Description
SYN
SPF
SIF
S-A
S-S
ACK
P-A
GET
EST
F1S
F2S
F3S
Internet sent FIN, protected ACKd FIN and has sent its own FIN.
F-F
299
Description
F1D
F2D
F3D
Protected sent FIN, Internet ACKd FIN and sent its own FIN.
CLS
RST
R-C
UNK
GETs
Related
Documentation
300
APPENDIX D
ICMP Types
Description
Echo Reply
Destination Unreachable
Source Quench
Echo Request
Time Exceeded
11
Parameter Problem
12
Timestamp Request
13
Timestamp Reply
14
Information Request
15
Information Reply
16
17
18
301
Related
Documentation
302
Parameter
Description
Destination Unreachable
Time Exceeded
Parameter Problem
Echo Request
128
Echo Reply
129
130
131
Group Membership
Reduction
132
Router Solicitation
133
Router Advertisement
134
Neighbor Solicitation
135
Neighbor Advertisement
136
Redirect
137
APPENDIX E
Description
-2
-1
Type
Details
-1
303
Type
Details
AS is blocked.
-2
304
Type
Details
IP Attack - Land
305
Type
Details
Overloaded IP - Backlog
Overloaded IP - Stall
Overloaded IP - Threads
306
Type
Details
TCP packet has a state table entry, but packet is out of state
(sequence numbers mismatch, or incorrect TCP flags).
TCP packet has no state table entry and is not a SYN (start of
connection) packet.
307
308
APPENDIX F
Type
---
--Unknown
-bc
---Broadcast---
Cannot be blocked
-bl
---Black List---
Always is blocked
-bo
---Bogon address---
-ca
-ce
---Class E---
-dc
---Default CHARM---
-lo
---Loopback---
-mc
---Multicast---
Cannot be blocked
-mp
---Mega Proxy---
Cannot be blocked
-nb
-pl
---Preferred List---
-pr
---RFC1918 address---
-u1
Details
309
Type
Details
-u2
-u3
-u4
-u5
-u6
-u7
-u8
-u9
-wl
---White-list---
Cannot be blocked
-wn
---White No Log---
Cannot be blocked
310
Code
Details
A1
Anonymous Proxy
A2
Satellite Provider
ABW
Aruba
AFG
Afghanistan
AGO
Angola
AIA
Anguilla
ALA
Aland Islands
ALB
Albania
AND
Andorra
ANT
Netherlands Antilles
AP
Asia/Pacific Region
AQ
Antarctica
Details
ARE
ARG
Argentina
ARM
Armenia
ASM
American Samoa
ATG
AUS
Australia
AUT
Austria
AZE
Azerbaijan
BDI
Burundi
BEL
Belgium
BEN
Benin
BFA
Burkina Faso
BGD
Bangladesh
BGR
Bulgaria
BHR
Bahrain
BHS
Bahamas
BIH
BLR
Belarus
BLZ
Belize
BMU
Bermuda
BOL
Bolivia
BRA
Brazil
BRB
Barbados
BRN
Brunei Darussalam
311
312
Code
Details
BTN
Bhutan
BV
Bouvet Island
BWA
Botswana
CAF
CAN
Canada
CC
CHE
Switzerland
CHL
Chile
CHN
China
CIV
Cte dIvoire
CMR
Cameroon
COD
COG
Congo
COK
Cook Islands
COL
Colombia
COM
Comoros
CPV
Cape Verde
CRI
Costa Rica
CUB
Cuba
CX
Christmas Island
CYM
Cayman Islands
CYP
Cyprus
CZE
Czech Republic
DEU
Germany
Details
DJI
Djibouti
DMA
Dominica
DNK
Denmark
DOM
Dominican Republic
DZA
Algeria
ECU
Ecuador
EGY
Egypt
ERI
Eritrea
ESH
Western Sahara
ESP
Spain
EST
Estonia
ETH
Ethiopia
EU
Europe
FIN
Finland
FJI
Fiji
FLK
FRA
France
FRO
Faroe Islands
FSM
FX
France, Metropolitan
GAB
Gabon
GBR
United Kingdom
GEO
Georgia
GGY
Guernsey
313
314
Code
Details
GHA
Ghana
GIB
Gibraltar
GIN
Guinea
GLP
Guadeloupe
GMB
Gambia
GNB
Guinea-Bissau
GNQ
Equatorial Guinea
GRC
Greece
GRD
Grenada
GRL
Greenland
GS
GTM
Guatemala
GUF
French Guiana
GUM
Guam
GUY
Guyana
HKG
Hong Kong
HM
HND
Honduras
HRV
Croatia
HTI
Haiti
HUN
Hungary
IDN
Indonesia
IMN
Isle of Man
IND
India
Details
IO
IRL
Ireland
IRN
IRQ
Iraq
ISL
Iceland
ISR
Israel
ITA
Italy
JAM
Jamaica
JEY
Jersey
JOR
Jordan
JPN
Japan
KAZ
Kazakhstan
KEN
Kenya
KGZ
Kyrgyzstan
KHM
Cambodia
KIR
Kiribati
KNA
KOR
Korea, Republic of
KWT
Kuwait
LAO
LBN
Lebanon
LBR
Liberia
LBY
LCA
Saint Lucia
315
316
Code
Details
LIE
Liechtenstein
LKA
Sri Lanka
LSO
Lesotho
LTU
Lithuania
LUX
Luxembourg
LVA
Latvia
MAC
Macau
MAR
Morocco
MCO
Monaco
MDA
Moldova, Republic of
MDG
Madagascar
MDV
Maldives
MEX
Mexico
MHL
Marshall Islands
MKD
Macedonia
MLI
Mali
MLT
Malta
MMR
Myanmar
MNE
Montenegro
MNG
Mongolia
MNP
MOZ
Mozambique
MRT
Mauritania
MSR
Montserrat
Details
MTQ
Martinique
MUS
Mauritius
MWI
Malawi
MYS
Malaysia
NAM
Namibia
NCL
New Caledonia
NER
Niger
NFK
Norfolk Island
NGA
Nigeria
NIC
Nicaragua
NIU
Niue
NLD
Netherlands
NOR
Norway
NPL
Nepal
NRU
Nauru
NZL
New Zealand
O1
Other
OMN
Oman
PAK
Pakistan
PAN
Panama
PCN
Pitcairn Islands
PER
Peru
PHL
Philippines
PLW
Palau
317
318
Code
Details
PNG
POL
Poland
PRI
Puerto Rico
PRK
PRT
Portugal
PRY
Paraguay
PSE
Palestinian Territory
PYF
French Polynesia
QAT
Qatar
REU
Reunion
ROU
Romania
RUS
Russian Federation
RWA
Rwanda
SAU
Saudi Arabia
SDN
Sudan
SEN
Senegal
SGP
Singapore
SHN
Saint Helena
SJM
SLB
Solomon Islands
SLE
Sierra Leone
SLV
El Salvador
SMR
San Marino
SOM
Somalia
Details
SPM
SRB
Serbia
STP
SUR
Suriname
SVK
Slovakia
SVN
Slovenia
SWE
Sweden
SWZ
Swaziland
SYC
Seychelles
SYR
TCA
TCD
Chad
TF
TGO
Togo
THA
Thailand
TJK
Tajikistan
TKL
Tokelau
TKM
Turkmenistan
TLS
Timor-Leste
TON
Tonga
TTO
TUN
Tunisia
TUR
Turkey
TUV
Tuvalu
319
Details
TWN
Taiwan
TZA
UGA
Uganda
UKR
Ukraine
UM
URY
Uruguay
USA
United States
UZB
Uzbekistan
VAT
VCT
VEN
Venezuela
VGB
VIR
VNM
Vietnam
VUT
Vanuatu
WLF
WSM
Samoa
YEM
Yemen
YT
Mayotte
ZAF
South Africa
ZMB
Zambia
ZWE
Zimbabwe
Table 71 on page 321 and Table 72 on page 322 provides the details of DDoS Secure
appliance that are sort by country.
320
---Black List---
-bo
---Bogon address---
-bc
---Broadcast---
-ca
---Country Allow---
-ce
---Class E---
-dc
---Default CHARM---
-lo
---Loopback---
-mc
---Multicast---
Cannot be blocked
-mp
---Mega Proxy---
Cannot be blocked
-nb
-pt
-pl
---Preferred List---
-pr
---RFC1918 address---
-u1
-u2
-u3
-u4
-u5
-u6
-u7
-u8
-u9
-wl
---White List---
Cannot be blocked
-wn
---White No Log---
Cannot be blocked
---
--Unknown--
Always is blocked
Cannot be blocked
321
322
AFG
Afghanistan
ALA
Aland Islands
ALB
Albania
DZA
Algeria
ASM
American Samoa
AND
Andorra
AGO
Angola
AIA
Anguilla
A1
Anonymous Proxy
AQ
Antarctica
ATG
ARG
Argentina
ARM
Armenia
ABW
Aruba
AP
Asia/Pacific Region
AUS
Australia
AUT
Austria
AZE
Azerbaijan
BHS
Bahamas
BHR
Bahrain
BGD
Bangladesh
BRB
Barbados
BLR
Belarus
BEL
Belgium
BLZ
Belize
Benin
BMU
Bermuda
BTN
Bhutan
BOL
Bolivia
BIH
BWA
Botswana
BV
Bouvet Island
BRA
Brazil
IO
BRN
Brunei Darussalam
BGR
Bulgaria
BFA
Burkina Faso
BDI
Burundi
KHM
Cambodia
CMR
Cameroon
CAN
Canada
CPV
Cape Verde
CYM
Cayman Islands
CAF
TCD
Chad
CHL
Chile
CHN
China
CX
Christmas Island
CC
COL
Colombia
323
324
COM
Comoros
COG
Congo
COD
COK
Cook Islands
CRI
Costa Rica
CIV
Cte dIvoire
HRV
Croatia
CUB
Cuba
CYP
Cyprus
CZE
Czech Republic
DNK
Denmark
DJI
Djibouti
DMA
Dominica
DOM
Dominican Republic
ECU
Ecuador
EGY
Egypt
SLV
El Salvador
GNQ
Equatorial Guinea
ERI
Eritrea
EST
Estonia
ETH
Ethiopia
EU
Europe
FLK
FRO
Faroe Islands
FJI
Fiji
Finland
FRA
France
FX
France, Metropolitan
GUF
French Guiana
PYF
French Polynesia
TF
GAB
Gabon
GMB
Gambia
GEO
Georgia
DEU
Germany
GHA
Ghana
GIB
Gibraltar
GRC
Greece
GRL
Greenland
GRD
Grenada
GLP
Guadeloupe
GUM
Guam
GTM
Guatemala
GGY
Guernsey
GIN
Guinea
GNB
Guinea-Bissau
GUY
Guyana
HTI
Haiti
HM
VAT
325
326
HND
Honduras
HKG
Hong Kong
HUN
Hungary
ISL
Iceland
IND
India
IDN
Indonesia
IRN
IRQ
Iraq
IRL
Ireland
IMN
Isle of Man
ISR
Israel
ITA
Italy
JAM
Jamaica
JPN
Japan
JEY
Jersey
JOR
Jordan
KAZ
Kazakhstan
KEN
Kenya
KIR
Kiribati
PRK
KOR
Korea, Republic of
KWT
Kuwait
KGZ
Kyrgyzstan
LAO
LVA
Latvia
Lebanon
LSO
Lesotho
LBR
Liberia
LBY
LIE
Liechtenstein
LTU
Lithuania
LUX
Luxembourg
MAC
Macau
MKD
Macedonia
MDG
Madagascar
MWI
Malawi
MYS
Malaysia
MDV
Maldives
MLI
Mali
MLT
Malta
MHL
Marshall Islands
MTQ
Martinique
MRT
Mauritania
MUS
Mauritius
YT
Mayotte
MEX
Mexico
FSM
MDA
Moldova, Republic of
MCO
Monaco
MNG
Mongolia
327
328
MNE
Montenegro
MSR
Montserrat
MAR
Morocco
MOZ
Mozambique
MMR
Myanmar
NAM
Namibia
NRU
Nauru
NPL
Nepal
NLD
Netherlands
ANT
Netherlands Antilles
NCL
New Caledonia
NZL
New Zealand
NIC
Nicaragua
NER
Niger
NGA
Nigeria
NIU
Niue
NFK
Norfolk Island
MNP
NOR
Norway
OMN
Oman
O1
Other
PAK
Pakistan
PLW
Palau
PSE
Palestinian Territory
PAN
Panama
PRY
Paraguay
PER
Peru
PHL
Philippines
PCN
Pitcairn Islands
POL
Poland
PRT
Portugal
PRI
Puerto Rico
QAT
Qatar
REU
Reunion
ROU
Romania
RUS
Russian Federation
RWA
Rwanda
SHN
Saint Helena
KNA
LCA
Saint Lucia
SPM
VCT
WSM
Samoa
SMR
San Marino
STP
A2
Satellite Provider
SAU
Saudi Arabia
SEN
Senegal
SRB
Serbia
329
330
SYC
Seychelles
SLE
Sierra Leone
SGP
Singapore
SVK
Slovakia
SVN
Slovenia
SLB
Solomon Islands
SOM
Somalia
ZAF
South Africa
GS
ESP
Spain
LKA
Sri Lanka
SDN
Sudan
SUR
Suriname
SJM
SWZ
Swaziland
SWE
Sweden
CHE
Switzerland
SYR
TWN
Taiwan
TJK
Tajikistan
TZA
THA
Thailand
TLS
Timor-Leste
TGO
Togo
TKL
Tokelau
Tonga
TTO
TUN
Tunisia
TUR
Turkey
TKM
Turkmenistan
TCA
TUV
Tuvalu
UGA
Uganda
UKR
Ukraine
ARE
GBR
United Kingdom
USA
United States
UM
URY
Uruguay
UZB
Uzbekistan
VUT
Vanuatu
VEN
Venezuela
VNM
Vietnam
VGB
VIR
WLF
ESH
Western Sahara
YEM
Yemen
ZMB
Zambia
ZWE
Zimbabwe
331
Related
Documentation
332
APPENDIX G
Table 73 on page 333 lists the front and back panel components of the DDoS
Secure-1200-Fail-Safe appliance.
Component
Front Panel
Back Panel
333
Related
Documentation
334
Callout
Component
Power supply
Video (Optional)
Serial interface
APPENDIX H
Troubleshooting
You are unable to recover the username and password. If Juniper Networks personnel
able to access your appliance, they might be able to reset the password. It might be
that you have to re-image the system.
3. What does Init Phase xxx mean?
When the appliance starts up, various large data sets have to be initialized. Each phase
is the initialization of a different data set.
4. What does Exit Phase xxx mean?
When the appliance closes down, various large data sets have to be cleanly closed
down. Each phase is the cleanup of a different data set.
5. Why do I get Protected IP Table Full turning to red?
335
Related
Documentation
336
APPENDIX I
GUI Branding
Login Page
To customize the login page:
1.
Take a copy of the source of the initial login page, https://a.b.c.d, and save it locally.
For example, If the site is accessed with the URL https://some.host.com, then the
search sequence is some.host.com-customer.tmpl, then customer.tmpl, and finally
the original login page.
Images/CSS Files
Once you have logged in, you are associated with a portal. Any .css file in the /css directory,
or any images in the /images directory, can be customized to modify the output.
For example, you are logged in to portal CustomerX and are requesting
css/center_pane.css. The search order is css/portal-CustomerX-center_pane.css, then
css/portal-center_pane.css, and finally css/center_pane.css. The same is true for any
images.
337
where w.x.y is the current version of the DDoS Secure appliance (for example: 5.13.1),
and then upload files.upg as a DDoS Secure appliance patch.
338
PART 4
Index
339
340
Index
Symbols
#, comments in configuration statements...................xix
( ), in syntax descriptions....................................................xix
< >, in syntax descriptions...................................................xix
[ ], in configuration statements........................................xix
{ }, in configuration statements........................................xix
| (pipe), in syntax descriptions..........................................xix
A
access control
DDoS Secure.....................................................................13
appliance mode
configuration.....................................................................21
arcsight extension
parameters.....................................................................292
authenticator
external..............................................................................84
B
back panel
DDoS Secure 1200......................................................333
bandwidth
configuration....................................................................27
BGP
configuration.................................................................254
BGP flow spec
definitions.........................................................................35
BGP trigger router
configuration.................................................................253
blacklisted traffic
understanding...............................................................257
block country
configuration.....................................................................41
braces, in configuration statements................................xix
brackets
angle, in syntax descriptions.....................................xix
square, in configuration statements.......................xix
bypass
country block................................................................260
change
CLI configuration...............................................................8
CHARM
tunables.............................................................................57
chassis
definitions..........................................................................61
CLI
navigating.............................................................................7
ping....................................................................................252
remove bgp......................................................................40
remove decryptkeys....................................................214
remove fagg.....................................................................90
remove filter.....................................................................32
remove gateway.............................................................114
remove geoip...................................................................50
remove inspect...............................................................96
remove portal.................................................................152
remove protected........................................................166
remove pseudol3 all.....................................................181
remove pseudol3 interface.......................................182
remove pseudol3 route..............................................183
remove route..................................................................133
remove share.................................................................190
remove tuneable............................................................59
remove user...................................................................228
set access https...............................................................15
set access https_juniper...............................................16
set access snmp..............................................................19
set access ssh...................................................................17
set access ssh_juniper...................................................18
set appliance...................................................................25
set auth.............................................................................86
set bgp flowspec............................................................39
set bgp peer.....................................................................38
set block as......................................................................46
set block cignoreip........................................................44
set block country............................................................43
set block ip.......................................................................45
set chassis bgp...............................................................66
set chassis blade............................................................65
set chassis reroute.........................................................67
set chassis vip.................................................................64
set clock ntp.....................................................................77
set clock timenow..........................................................75
set clock timezone.........................................................76
set debugging..................................................................82
set decryptkeys default..............................................212
set decryptkeys specific.............................................213
341
set disabled.......................................................................71
set dns...............................................................................132
set fagg...............................................................................91
set filter..............................................................................33
set gateway......................................................................115
set geoip auto_akamai.................................................55
set geoip ip.........................................................................51
set geoip megaproxy_ip...............................................53
set geoip megaproxy_url.............................................54
set geoip url......................................................................52
set incidents...................................................................109
set inspect.........................................................................97
set interface datashare..............................................126
set interface internet...................................................128
set interface ipmi..........................................................130
set interface management.......................................125
set interface protected................................................127
set mail.............................................................................120
set netflow......................................................................139
set operation...................................................................157
set portal..........................................................................153
set portaldefense..........................................................161
set preferred clients....................................................144
set preferred countries...............................................145
set preferred default...................................................148
set preferred whitelist................................................146
set preferred whitenolog............................................147
set protected.................................................................168
set proxy...........................................................................173
set pseudol3 interface................................................178
set pseudol3 network.................................................179
set pseudol3 route......................................................180
set route...........................................................................135
set share...........................................................................191
set snmp..........................................................................195
set structured................................................................199
set syslog........................................................................203
set terminal...................................................................246
set threshold...................................................................107
set timeout....................................................................208
set tuneable.....................................................................60
set usage.........................................................................224
set user............................................................................229
set wrapper blocked....................................................218
set wrapper reverse.....................................................219
set wrapper unwrap...................................................220
show access......................................................................14
show appliance...............................................................24
show auth.........................................................................85
342
show bgp...........................................................................37
show block........................................................................42
show chassis....................................................................63
show clock........................................................................74
show config........................................................................9
show debugging..............................................................81
show decryptkeys........................................................210
show disabled.................................................................70
show dns...........................................................................131
show fagg.........................................................................89
show filter.........................................................................30
show gateway.................................................................113
show geoip.......................................................................49
show incidents..............................................................108
show inspect...................................................................95
show interface...............................................................124
show mail.........................................................................119
show netflow.................................................................138
show operation.............................................................156
show pending changes.................................................10
show portal......................................................................151
show portaldefense....................................................160
show preferred..............................................................143
show protected.............................................................165
show proxy.......................................................................172
show pseudol3...............................................................177
show route......................................................................134
show run.............................................................................10
show share.....................................................................189
show snmp.....................................................................194
show structured............................................................198
show syslog...................................................................202
show terminal...............................................................245
show threshold alert...................................................106
show threshold create...............................................104
show threshold offenders.........................................105
show threshold view...................................................103
show timeout................................................................207
show timezones..............................................................78
show tuneable................................................................58
show usage....................................................................223
show user........................................................................227
show version.................................................................249
show wrapper.................................................................217
stats view.......................................................................248
system check................................................................240
system clear_custom.................................................239
system config_reset....................................................238
system factoryreset.....................................................237
Index
system helpdesk...........................................................241
system powerdown....................................................236
system reboot...............................................................235
system restart...............................................................232
system restart_clear...................................................233
system shutdown........................................................234
CLI configuration
changing..............................................................................8
CLI session
starting..................................................................................5
comments, in configuration statements.......................xix
configure
appliance mode...............................................................21
bandwidth.........................................................................27
BGP...................................................................................254
BGP trigger router........................................................253
black country....................................................................41
country code....................................................................47
date and time...................................................................73
file aggregation...............................................................88
geoIP...................................................................................47
IP address..........................................................................41
MAC gateway...................................................................111
netflow..............................................................................137
network..............................................................................121
peering router sample...............................................254
port filter............................................................................27
portal defense...............................................................159
portal operational mode...........................................155
preferred clients.............................................................141
preferred whitelisting...................................................141
protected IP....................................................................163
pseudol3...........................................................................175
shares................................................................................187
configuring
DDoS Secure appliance engine.............................259
content
standard file..................................................................258
content presentation
information.....................................................................257
convention
filenaming.......................................................................257
conventions
text and syntax.............................................................xviii
country block
bypassing.......................................................................260
country code
configuration....................................................................47
country codes
DDoS Secure appliance...........................................309
CSS file......................................................................................337
curly braces, in configuration statements.....................xix
customer support....................................................................xx
contacting JTAC...............................................................xx
customized file
removing.........................................................................338
updating..........................................................................338
D
date and time
configuration....................................................................73
DDoS Secure
access control..................................................................13
login page........................................................................337
DDoS Secure 1200
back panel......................................................................333
front panel......................................................................333
DDoS Secure appliance
country codes...............................................................309
engine configuration..................................................259
ICMP types......................................................................301
index attack types.......................................................303
iTCP states.....................................................................299
logging..............................................................................185
remote alerts..................................................................185
reports..............................................................................185
serial port connecting.....................................................4
SSH connecting................................................................4
system console connecting..........................................5
troubleshooting............................................................335
DDoS Secure CLI
introduction.........................................................................3
debug
options...............................................................................79
decrypt
SSL...................................................................................209
definition
BGP flow spec.................................................................35
chassis.................................................................................61
description
structured syslog..........................................................273
disabling
RFC test.............................................................................69
documentation
comments on..................................................................xix
343
E
event type................................................................................275
external
authenticators................................................................84
logging
thresholds.........................................................................99
login page
DDoS Secure..................................................................337
file aggregation
configuration...................................................................88
filename
convention......................................................................257
font conventions...................................................................xviii
force specific
rerouting..........................................................................256
format
variable value................................................................263
front panel
DDoS Secure 1200......................................................333
MAC gateway
configuration....................................................................111
mail
reporting............................................................................117
managing
users..................................................................................225
manuals
comments on..................................................................xix
message
general.............................................................................294
incident............................................................................295
permanent blacklist....................................................297
permanent whitelist...................................................297
temporary blacklist.....................................................297
worst offender..............................................................296
G
general
messages.......................................................................294
geoIP
configuration....................................................................47
I
ICMP types
DDoS Secure appliance.............................................301
image file..................................................................................337
incident
messages.......................................................................295
index attack types
DDoS Secure appliance............................................303
information
content presentation..................................................257
inspection
layer 7..................................................................................93
introduction
DDoS Secure CLI...............................................................3
IP address
configuration.....................................................................41
L
layer 7
inspection.........................................................................93
LEEF extension
parameters....................................................................290
log
DDoS Secure appliance.............................................185
344
N
navigate
through CLI..........................................................................7
netflow
configuration...................................................................137
network
configuration...................................................................121
O
option
debug..................................................................................79
P
parameter
arcsight extensions.....................................................292
LEEF extensions..........................................................290
portals..............................................................................149
proxy server......................................................................171
rerouting trigger............................................................255
SNMP................................................................................193
structured syslog...........................................................197
syslog................................................................................201
TCP state timeouts....................................................205
terminal configuration...............................................243
traffic interception........................................................215
usage.................................................................................221
parentheses, in syntax descriptions................................xix
Index
R
remote alert
DDoS Secure appliance.............................................185
remove
customized files...........................................................338
remove bgp
CLI........................................................................................40
remove decryptkeys
CLI.......................................................................................214
remove fagg
CLI.......................................................................................90
remove filter
CLI........................................................................................32
remove gateway
CLI.......................................................................................114
remove geoip
CLI........................................................................................50
remove inspect
CLI........................................................................................96
remove portal
CLI.......................................................................................152
remove protected
CLI......................................................................................166
remove pseudol3 all
CLI.......................................................................................181
remove pseudol3 interface
CLI......................................................................................182
remove pseudol3 route
CLI......................................................................................183
remove route
CLI.......................................................................................133
remove share
CLI......................................................................................190
remove tuneable
CLI........................................................................................59
remove user
CLI......................................................................................228
report
DDoS Secure appliance.............................................185
mail......................................................................................117
rerouting trigger
parameters.....................................................................255
RFC testing
disable................................................................................69
S
serial port connect
DDoS Secure appliance.................................................4
set access https
CLI.........................................................................................15
set access https_juniper
CLI.........................................................................................16
set access snmp
CLI.........................................................................................19
set access ssh
CLI..........................................................................................17
set access ssh_juniper
CLI.........................................................................................18
set appliance
CLI........................................................................................25
set auth
CLI........................................................................................86
set bgp flowspec
CLI........................................................................................39
set bgp peer
CLI........................................................................................38
set block as
CLI........................................................................................46
set block cignoreip
CLI........................................................................................44
345
346
Index
set syslog
CLI.....................................................................................203
set terminal
CLI.....................................................................................246
set threshold
CLI.......................................................................................107
set timeout
CLI.....................................................................................208
set tuneable
CLI.......................................................................................60
set usage
CLI......................................................................................224
set user
CLI......................................................................................229
set wrapper blocked
CLI......................................................................................218
set wrapper reverse
CLI......................................................................................219
set wrapper unwrap
CLI.....................................................................................220
shares
configuration..................................................................187
show access
CLI.........................................................................................14
show appliance
CLI........................................................................................24
show auth
CLI........................................................................................85
show bgp
CLI.........................................................................................37
show block
CLI........................................................................................42
show chassis
CLI........................................................................................63
show clock
CLI.........................................................................................74
show config
CLI..........................................................................................9
show debugging
CLI.........................................................................................81
show decryptkeys
CLI......................................................................................210
show disabled
CLI........................................................................................70
show dns
CLI........................................................................................131
show fagg
CLI........................................................................................89
show filter
CLI........................................................................................30
show gateway
CLI........................................................................................113
show geoip
CLI........................................................................................49
show incidents
CLI......................................................................................108
show inspect
CLI........................................................................................95
show interface
CLI.......................................................................................124
show mail
CLI.......................................................................................119
show netflow
CLI......................................................................................138
show operation
CLI......................................................................................156
show pending changes
CLI.........................................................................................10
show portal
CLI........................................................................................151
show portaldefense
CLI......................................................................................160
show preferred
CLI.......................................................................................143
show protected
CLI......................................................................................165
show proxy
CLI.......................................................................................172
show pseudol3
CLI.......................................................................................177
show route
CLI......................................................................................134
show run
CLI.........................................................................................10
show share
CLI......................................................................................189
show snmp
CLI......................................................................................194
show structured
CLI......................................................................................198
show syslog
CLI.....................................................................................202
show terminal
CLI......................................................................................245
show threshold alert
CLI......................................................................................106
347
348
system helpdesk
CLI.......................................................................................241
system powerdown
CLI.....................................................................................236
system reboot
CLI......................................................................................235
system restart
CLI......................................................................................232
system restart_clear
CLI......................................................................................233
system shutdown
CLI......................................................................................234
T
TCP state
DDoS Secure appliance............................................299
timeout parameters...................................................205
technical support
contacting JTAC...............................................................xx
temporary blacklist
messages........................................................................297
terminal configuration
parameters.....................................................................243
threshold
logging...............................................................................99
traffic interception
parameters......................................................................215
troubleshoot
DDoS Secure appliance............................................335
tunable
CHARM...............................................................................57
U
understand
blacklisted traffic.........................................................257
webserver information..............................................259
update
customized files...........................................................338
usage
parameters......................................................................221
user
management.................................................................225
V
variable value
formats............................................................................263
Index
W
webserver information
understanding..............................................................259
worst offender
messages.......................................................................296
349
350