0% found this document useful (0 votes)
45 views

Control Plane Policing Copp

This document discusses Control Plane Policing (CoPP) which protects the Route Processor (RP) from unnecessary or denial-of-service (DoS) traffic by giving priority to important control plane and management traffic. It describes the default CoPP class maps and policy, prerequisites and restrictions for CoPP, and how to configure and monitor CoPP.

Uploaded by

Pouya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
45 views

Control Plane Policing Copp

This document discusses Control Plane Policing (CoPP) which protects the Route Processor (RP) from unnecessary or denial-of-service (DoS) traffic by giving priority to important control plane and management traffic. It describes the default CoPP class maps and policy, prerequisites and restrictions for CoPP, and how to configure and monitor CoPP.

Uploaded by

Pouya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

CHAPTER 76

Control Plane Policing (CoPP)

• Prerequisites for CoPP, page 76-1


• Restrictions for CoPP, page 76-2
• Information About CoPP, page 76-3
• Default Settings for CoPP, page 76-3
• How to Configure CoPP, page 76-5
• Monitoring CoPP, page 76-9

Note • For complete syntax and usage information for the commands used in this chapter, see these
publications:
http://www.cisco.com/en/US/products/ps11846/prod_command_reference_list.html
• For more information about CoPP, see this document:
http://www.cisco.com/en/US/prod/collateral/switches/ps5718/ps708/white_paper_c11-663623.html
• Cisco IOS Release 15.3SY supports only Ethernet interfaces. Cisco IOS Release 15.3SY does not
support any WAN features or commands.

Tip For additional information about Cisco Catalyst 6500 Series Switches (including configuration examples
and troubleshooting information), see the documents listed on this page:
http://www.cisco.com/en/US/products/hw/switches/ps708/tsd_products_support_series_home.html
Participate in the Technical Documentation Ideas forum

Prerequisites for CoPP


None.

Supervisor Engine 6T Software Configuration Guide, Release 15.3SY


76-1
Chapter 76 Control Plane Policing (CoPP)
Restrictions for CoPP

Restrictions for CoPP


• The PFC and DFC provide hardware support for classes that match multicast traffic.
• CoPP is not supported in hardware for broadcast packets. The combination of ACLs, traffic storm
control, and CoPP software protection provides protection against broadcast DoS attacks.
• CoPP does not support non-IP classes except for the default non-IP class. ACLs can be used instead
of non-IP classes to drop non-IP traffic, and the default non-IP CoPP class can be used to limit to
non-IP traffic that reaches the RP CPU.
• Do not use the log keyword in CoPP policy ACLs.
• If you have a large QoS configuration, the system may run out of TCAM space. If this is the case,
CoPP may be performed in software.
• When there is a large QoS configuration for other interfaces, you can run out of TCAM space. When
this situation occurs, CoPP may be performed entirely in software and result in performance
degradation and CPU cycle consumption.
• You must ensure that the CoPP policy does not filter critical traffic such as routing protocols or
interactive access to the switches. Filtering this traffic could prevent remote access to the switch,
requiring a console connection.
• The PFC and DFCs support built-in special-case rate limiters, which are useful for situations where
an ACL cannot be used (for example, TTL, MTU, and IP options). When you enable the special-case
rate limiters, you should be aware that the special-case rate limiters will override the CoPP policy
for packets matching the rate-limiter criteria.
• Neither egress CoPP nor silent mode is supported. CoPP is only supported on ingress (service-policy
output CoPP cannot be applied to the control plane interface).
• ACE hit counters in hardware are only for ACL logic. You can rely on software ACE hit counters
and the show access-list, show policy-map control-plane, and show platform ip qos commands
to troubleshoot evaluate CPU traffic.
• CoPP is performed on a per-forwarding-engine basis and software CoPP is performed on an
aggregate basis.
• CoPP does not support ACEs with the log keyword.
• CoPP uses hardware QoS TCAM resources. Enter the show tcam utilization command to verify the
TCAM utilization.
• To avoid matching the filtering and policing that are configured in a subsequent class, configure
policing in each class. CoPP does not apply the filtering in a class that does not contain a police
command. A class without a police command matches no traffic.
• The ACLs used for classification are QoS ACLs. The supported QoS ACLs are IP standard,
extended, and named.
• These are the only match types supported:
– ip precedence
– ip dscp
– access-group
• Only IP ACLs are supported in hardware.
• MAC-based matching is done in software only.
• You can enter one match command in a single class map only.

Supervisor Engine 6T Software Configuration Guide, Release 15.3SY


76-2
Chapter 76 Control Plane Policing (CoPP)
Information About CoPP

• When defining the service policy, the police policy-map action is the only supported action.
• When applying the service policy to the control plane, the input direction is only supported.

Information About CoPP


The traffic managed by the RP is divided into three functional components or planes:
• Data plane
• Management plane
• Control plane
The control plane policing (CoPP) feature increases security on the switch by protecting the RP from
unnecessary or DoS traffic and giving priority to important control plane and management traffic. The
PFC and DFCs provide hardware support for CoPP. CoPP works with the hardware rate limiters.
The PFC and DFCs support the built-in “special case” rate limiters that can be used when an ACL cannot
classify particular scenarios, such as IP options cases, TTL and MTU failure cases, packets with errors,
and multicast packets. When enabling the special-case rate limiters, the special-case rate limiters
override the CoPP policy for packets matching the rate-limiter criteria.
The majority of traffic managed by the RP is handled by way of the control and management planes. You
can use CoPP to protect the control and management planes, and ensure routing stability, reachability,
and packet delivery. CoPP uses a dedicated control plane configuration through the modular QoS CLI
(MQC) to provide filtering and rate-limiting capabilities for the control plane packets.
You must first identify the traffic to be classified by defining a class map. The class map defines packets
for a particular traffic class. After you have classified the traffic, you can create policy maps to enforce
policy actions for the identified traffic.

Default Settings for CoPP


CoPP is enabled by default. To disable the default CoPP configuration, enter the no service-policy input
policy-default-autocopp control plane configuration mode command.
These are the default CoPP class maps:
class-map match-any class-copp-icmp-redirect-unreachable
class-map match-all class-copp-glean
class-map match-all class-copp-receive
class-map match-all class-copp-options
class-map match-all class-copp-broadcast
class-map match-all class-copp-mcast-acl-bridged
class-map match-all class-copp-slb
class-map match-all class-copp-mtu-fail
class-map match-all class-copp-ttl-fail
class-map match-all class-copp-arp-snooping
class-map match-any class-copp-mcast-copy
class-map match-any class-copp-ip-connected
class-map match-any class-copp-match-igmp
match access-group name acl-copp-match-igmp
class-map match-all class-copp-unknown-protocol
class-map match-any class-copp-vacl-log
class-map match-all class-copp-mcast-ipv6-control
class-map match-any class-copp-match-pimv6-data
match access-group name acl-copp-match-pimv6-data
class-map match-any class-copp-mcast-punt

Supervisor Engine 6T Software Configuration Guide, Release 15.3SY


76-3
Chapter 76 Control Plane Policing (CoPP)
Default Settings for CoPP

class-map match-all class-copp-unsupp-rewrite


class-map match-all class-copp-ucast-egress-acl-bridged
class-map match-all class-copp-ip-admission
class-map match-all class-copp-service-insertion
class-map match-all class-copp-mac-pbf
class-map match-any class-copp-match-mld
match access-group name acl-copp-match-mld
class-map match-all class-copp-ucast-ingress-acl-bridged
class-map match-all class-copp-dhcp-snooping
class-map match-all class-copp-wccp
class-map match-all class-copp-nd
class-map match-any class-copp-ipv6-connected
class-map match-all class-copp-mcast-rpf-fail
class-map match-any class-copp-ucast-rpf-fail
class-map match-all class-copp-mcast-ip-control
class-map match-any class-copp-match-pim-data
match access-group name acl-copp-match-pim-data
class-map match-any class-copp-match-ndv6
match access-group name acl-copp-match-ndv6
class-map match-any class-copp-mcast-v4-data-on-routedPort
class-map match-any class-copp-mcast-v6-data-on-routedPort

This is the default CoPP policy map:


policy-map policy-default-autocopp
class class-copp-mcast-v4-data-on-routedPort
police rate 10 pps burst 1 packets
conform-action drop
exceed-action drop
class class-copp-mcast-v6-data-on-routedPort
police rate 10 pps burst 1 packets
conform-action drop
exceed-action drop
class class-copp-icmp-redirect-unreachable
police rate 100 pps burst 10 packets
conform-action transmit
exceed-action drop
class class-copp-ucast-rpf-fail
police rate 100 pps burst 10 packets
conform-action transmit
exceed-action drop
class class-copp-vacl-log
police rate 2000 pps burst 1 packets
conform-action transmit
exceed-action drop
class class-copp-mcast-punt
police rate 1000 pps burst 256 packets
conform-action transmit
exceed-action drop
class class-copp-mcast-copy
police rate 1000 pps burst 256 packets
conform-action transmit
exceed-action drop
class class-copp-ip-connected
police rate 1000 pps burst 256 packets
conform-action transmit
exceed-action drop
class class-copp-ipv6-connected
police rate 1000 pps burst 256 packets
conform-action transmit
exceed-action drop
class class-copp-match-pim-data

Supervisor Engine 6T Software Configuration Guide, Release 15.3SY


76-4
Chapter 76 Control Plane Policing (CoPP)
How to Configure CoPP

police rate 1000 pps burst 1000 packets


conform-action transmit
exceed-action drop
class class-copp-match-pimv6-data
police rate 1000 pps burst 1000 packets
conform-action transmit
exceed-action drop
class class-copp-match-mld
police rate 5000 pps burst 5000 packets
conform-action set-discard-class-transmit 48
exceed-action transmit
class class-copp-match-igmp
police rate 5000 pps burst 5000 packets
conform-action set-discard-class-transmit 48
exceed-action transmit
class class-copp-match-ndv6
police rate 1000 pps burst 1000 packets
conform-action set-discard-class-transmit 48
exceed-action drop

Note The default policer rate for the MLD and IGMP classes has been updated to 5000 pps from the previous
default value of 10000 pps. If the default policer rate for the MLD and IGMP classes is not set to 5000
pps, change the value manually by running the no policy-map policy-default-autocopp and platform
qos auto-copp commands in global configuration mode.

How to Configure CoPP


• Configuring CoPP, page 76-5
• Defining CoPP Traffic Classification, page 76-6

Configuring CoPP
To configure CoPP, perform this task:

Command Purpose
Step 1 Router(config)# ip access-list extended Creates an extended ACL.
access_list_name
Note You must configure ACLs in most cases to
identify the important or unimportant traffic.
Step 2 Router(config-ext-nacl)# {permit | deny} protocol Configures filtering in the ACL:
source source_wildcard destination
destination_wildcard [precedence precedence] • permit sets the conditions under which a packet
[tos tos] [established] [log | log-input] passes a named IP access list.
[time-range time_range_name] [fragments]
• deny sets the conditions under which a packet does
not pass a named IP access list.
Step 3 Router(config)# class-map traffic_class_name Creates a class map.
Step 4 Router(config-cmap)# match {ip precedence | Configures matching in the class map.
ip dscp | access_group}
Step 5 Router(config)# policy-map service-policy-name Defines a service policy map.
Step 6 Router(config-pmap)# class traffic_class_name Creates a policy map class.

Supervisor Engine 6T Software Configuration Guide, Release 15.3SY


76-5
Chapter 76 Control Plane Policing (CoPP)
How to Configure CoPP

Command Purpose
Step 7 Router(config-pmap-c)# police bits_per_second Configures policing in the service policy map. You can
[normal_burst_bytes [maximum_burst_bytes]] configure any of the following:
[pir peak_rate_bps]
[[[conform-action selected_action] • Byte-based policing.
exceed-action selected_action]
violate-action selected_action] • Packet-based policing.
• Flow-based policing.
Router(config-pmap-c)# police rate units bps
[burst burst_bytes bytes] [peak-rate See the “Configuring Policy Map Class Policing” section
peak_rate_bps bps] [peak-burst peak_burst_bytes on page 62-11.
bytes] [conform-action selected_action]
[exceed-action selected_action]
[violate-action selected_action]

Router(config-pmap-c)# police rate units pps


[burst burst_packets packets]
[peak-rate peak_rate_pps pps]
[peak-burst peak_burst_packets packets]
[conform-action selected_action]
[exceed-action selected_action]
[violate-action selected_action]

Router(config-pmap-c)# police flow


[mask {src-only | dest-only | full-flow}]
bits_per_second normal_burst_bytes
[[[conform-action {drop |
set-dscp-transmit dscp_value |
set-prec-transmit ip_precedence_value
| transmit}] exceed-action {drop | policed-dscp |
transmit}] violate-action {drop | policed-dscp |
transmit}]
Step 8 Router(config)# control-plane Enters the control plane configuration mode.
Step 9 Router(config-cp)# service-policy input Applies the QoS service policy to the control plane.
service-policy-name

Defining CoPP Traffic Classification


• Traffic Classification Overview, page 76-6
• Traffic Classification Restrictions, page 76-7
• Sample Basic ACLs for CoPP Traffic Classification, page 76-8

Traffic Classification Overview


You can define any number of classes, but typically traffic is grouped into classes that are based on
relative importance. The following provides a sample grouping:
• Border Gateway Protocol (BGP)—Traffic that is crucial to maintaining neighbor relationships for
BGP routing protocol, for example, BGP keepalives and routing updates. Maintaining BGP routing
protocol is crucial to maintaining connectivity within a network or to a service provider. Sites that
do not run BGP do not need to use this class.

Supervisor Engine 6T Software Configuration Guide, Release 15.3SY


76-6
Chapter 76 Control Plane Policing (CoPP)
How to Configure CoPP

• Interior Gateway Protocol (IGP)—Traffic that is crucial to maintaining IGP routing protocols, for
example, open shortest path first OSPF, enhanced interior gateway routing protocol (EIGRP), and
routing information protocol (RIP). Maintaining IGP routing protocols is crucial to maintaining
connectivity within a network.
• Management—Necessary, frequently used traffic that is required during day-to-day operations. For
example, traffic used for remote network access, and Cisco IOS image upgrades and management,
such as Telnet, secure shell (SSH), network time protocol (NTP), simple network management
protocol (SNMP), terminal access controller access control system (TACACS), hypertext transfer
protocol (HTTP), trivial file transfer protocol (TFTP), and file transfer protocol (FTP).
• Reporting—Traffic used for generating network performance statistics for the purpose of reporting.
For example, using Cisco IOS IP service level agreements (SLAs) to generate ICMP with different
DSCP settings in order to report on response times within different QoS data classes.
• Monitoring—Traffic used for monitoring a switch. Traffic should be permitted but should never be
a risk to the switch; with CoPP, this traffic can be permitted but limited to a low rate. For example,
ICMP echo request (ping) and traceroute.
• Critical Applications—Critical application traffic that is specific and crucial to a particular customer
environment. Traffic included in this class should be tailored specifically to the required application
requirements of the user (in other words, one customer may use multicast, while another uses IPsec
or generic routing encapsulation (GRE). For example, GRE, hot standby router protocol (HSRP),
virtual router redundancy protocol (VRRP), session initiation protocol (SIP), data link switching
(DLSw), dynamic host configuration protocol (DHCP), multicast source discovery protocol
(MSDP), Internet group management protocol (IGMP), protocol independent multicast (PIM),
multicast traffic, and IPsec.
• Layer 2 Protocols—Traffic used for address resolution protocol (ARP). Excessive ARP packets can
potentially monopolize RP resources, starving other important processes; CoPP can be used to rate
limit ARP packets to prevent this situation. ARP is the only Layer 2 protocol that can be specifically
classified using the match protocol classification criteria.
• Undesirable—Explicitly identifies bad or malicious traffic that should be unconditionally dropped
and denied access to the RP. The undesirable classification is particularly useful when known traffic
destined for the switch should always be denied and not placed into a default category. If you
explicitly deny traffic, then you can enter show commands to collect approximate statistics on the
denied traffic and estimate its rate.
• Default—All remaining traffic destined for the RP that has not been identified. MQC provides the
default class, so the user can specify the treatment to be applied to traffic not explicitly identified in
the other user-defined classes. This traffic has a highly reduced rate of access to the RP. With a
default classification in place, statistics can be monitored to determine the rate of otherwise
unidentified traffic destined for the control plane. After this traffic is identified, further analysis can
be performed to classify it and, if needed, the other CoPP policy entries can be updated to
accomodate this traffic.
After you have classified the traffic, the ACLs build the classes of traffic that are used to define the
policies. For sample basic ACLs for CoPP classification, see the “Sample Basic ACLs for CoPP Traffic
Classification” section on page 76-8.

Traffic Classification Restrictions


• Before you develop the actual CoPP policy, you must identify and separate the required traffic into
different classes. Traffic is grouped into nine classes that are based on relative importance. The
actual number of classes needed might differ and should be selected based on your local
requirements and security policies.

Supervisor Engine 6T Software Configuration Guide, Release 15.3SY


76-7
Chapter 76 Control Plane Policing (CoPP)
How to Configure CoPP

• You do not have to define policies that match bidirectionally. You only need to identify traffic
unidirectionally (from the network to the RP) since the policy is applied on ingress only.

Sample Basic ACLs for CoPP Traffic Classification


This section shows sample basic ACLs for CoPP classification. In the samples, the commonly required
traffic is identified with these ACLs:
• ACL 120—Critical traffic
• ACL 121—Important traffic
• ACL 122—Normal traffic
• ACL 123—Explicitly denies unwanted traffic
• ACL 124—All other traffic
This example shows how to define ACL 120 for critical traffic:
Router(config)# access-list 120 remark CoPP ACL for critical traffic

This example shows how to allow BGP from a known peer to this switch’s BGP TCP port:
Router(config)# access-list 120 permit tcp host 47.1.1.1 host 10.9.9.9 eq bgp

This example shows how to allow BGP from a peer’s BGP port to this switch:
Router(config)# access-list 120 permit tcp host 47.1.1.1 eq bgp host 10.9.9.9
Router(config)# access-list 120 permit tcp host 10.86.183.120 host 10.9.9.9 eq bgp
Router(config)# access-list 120 permit tcp host 10.86.183.120 eq bgp host 10.9.9.9

This example shows how to define ACL 121 for the important class:
Router(config)# access-list 121 remark CoPP Important traffic

This example shows how to permit return traffic from TACACS host:
Router(config)# access-list 121 permit tcp host 1.1.1.1 host 10.9.9.9 established

This example shows how to permit SSH access to the switch from a subnet:
Router(config)# access-list 121 permit tcp 10.0.0.0 0.0.0.255 host 10.9.9.9 eq 22

This example shows how to allow full access for Telnet to the switch from a host in a specific subnet and
police the rest of the subnet:
Router(config)# access-list 121 deny tcp host 10.86.183.3 any eq telnet
Router(config)# access-list 121 permit tcp 10.86.183.0 0.0.0.255 any eq telnet

This example shows how to allow SNMP access from the NMS host to the switch:
Router(config)# access-list 121 permit udp host 1.1.1.2 host 10.9.9.9 eq snmp

This example shows how to allow the switch to receive NTP packets from a known clock source:
Router(config)# access-list 121 permit udp host 1.1.1.3 host 10.9.9.9 eq ntp

This example shows how to define ACL 122 for the normal traffic class:
Router(config)# access-list 122 remark CoPP normal traffic

This example shows how to permit switch-originated traceroute traffic:


Router(config)# access-list 122 permit icmp any any ttl-exceeded
Router(config)# access-list 122 permit icmp any any port-unreachable

Supervisor Engine 6T Software Configuration Guide, Release 15.3SY


76-8
Chapter 76 Control Plane Policing (CoPP)
Monitoring CoPP

This example shows how to permit receipt of responses to the switch that originated the pings:
Router(config)# access-list 122 permit icmp any any echo-reply

This example shows how to allow pings to the switch:


Router(config)# access-list 122 permit icmp any any echo

This example shows how to define ACL 123 for the undesirable class.
Router(config)# access-list 123 remark explicitly defined "undesirable" traffic

Note In the following example, ACL 123 is a permit entry for classification and monitoring purposes, and
traffic is dropped as a result of the CoPP policy.

This example shows how to permit all traffic destined to UDP 1434 for policing:
Router(config)# access-list 123 permit udp any any eq 1434

This example shows how to define ACL 124 for all other traffic:
Router(config)# access-list 124 remark rest of the IP traffic for CoPP
Router(config)# access-list 124 permit ip any any

Monitoring CoPP
You can enter the show policy-map control-plane command for developing site-specific policies,
monitoring statistics for the control plane policy, and troubleshooting CoPP. This command displays
dynamic information about the actual policy applied, including rate information and the number of bytes
(and packets) that conformed or exceeded the configured policies both in hardware and in software.
The output of the show policy-map control-plane command is as follows:
Router# show policy-map control-plane
Control Plane Interface
Service policy CoPP-normal
Hardware Counters:
class-map: CoPP-normal (match-all)
Match: access-group 130
police :
96000 bps 3000 limit 3000 extended limit
Earl in slot 3 :
0 bytes
5 minute offered rate 0 bps
aggregate-forwarded 0 bytes action: transmit
exceeded 0 bytes action: drop
aggregate-forward 0 bps exceed 0 bps
Earl in slot 5 :
0 bytes
5 minute offered rate 0 bps
aggregate-forwarded 0 bytes action: transmit
exceeded 0 bytes action: drop
aggregate-forward 0 bps exceed 0 bps

Software Counters:
Class-map: CoPP-normal (match-all) 0 packets, 0 bytes
5 minute offered rate 0 bps, drop rate 0 bps
Match: access-group 130
police:
96000 bps, 3125 limit, 3125 extended limit

Supervisor Engine 6T Software Configuration Guide, Release 15.3SY


76-9
Chapter 76 Control Plane Policing (CoPP)
Monitoring CoPP

conformed 0 packets, 0 bytes; action: transmit


exceeded 0 packets, 0 bytes; action: drop
conformed 0 bps, exceed 0 bps, violate 0 bps
Router#

To display the hardware counters for bytes dropped and forwarded by the policy, enter the show
platform qos ip command:
Router# show platform qos ip
QoS Summary [IP]: (* - shared aggregates, Mod - switch module)

Int Mod Dir Class-map DSCP


Agg Trust Fl AgForward-By AgPoliced-By
Id Id
-------------------------------------------------------------------------------
CPP 5 In CoPP-normal 0 1 dscp 0 505408 83822272
CPP 9 In CoPP-normal 0 4 dscp 0 0 0
Router#

To display the CoPP access list information, enter the show access-lists coppacl-bgp command:
Router# show access-lists coppacl-bgp
Extended IP access list coppacl-bgp
10 permit tcp host 47.1.1.1 host 10.9.9.9 eq bgp (4 matches)
20 permit tcp host 47.1.1.1 eq bgp host 10.9.9.9
30 permit tcp host 10.86.183.120 host 10.9.9.9 eq bgp (1 match)
40 permit tcp host 10.86.183.120 eq bgp host 10.9.9.9

Tip For additional information about Cisco Catalyst 6500 Series Switches (including configuration examples
and troubleshooting information), see the documents listed on this page:
http://www.cisco.com/en/US/products/hw/switches/ps708/tsd_products_support_series_home.html
Participate in the Technical Documentation Ideas forum

Supervisor Engine 6T Software Configuration Guide, Release 15.3SY


76-10

You might also like