- Table of Contents
-
- H3C SecPath AFC2000-EX0-G Series Abnormal Traffic Cleaning System Configuration Examples-5W100
- 00-Preface
- 01-Series Deployment Single-Machine Single-Channel and Multi-Channel Configuration Example.
- 02-BGP Layer 3 Bypass Return Path Configuration Example
- 03-BGP Auto-Diversion Deployment with Bypass and Abnormal Traffic Detection System Example
- 04-TCP Port Protection Configuration Example
- 05-AFC Comprehensive Protection Configuration Example
- 06-Typical Configuration Examples of Traction Management Example
- 07-OSPF Layer 2 Reintroduction Configuration Example
- 08-Cascaded Cluster and Dual-Node Active-Standby Configuration Example
- 09-Bypass BGP Layer 2 Return Traffic Configuration Example
- 10-OSPF-Based Three-Layer Return Injection Configuration Example
- 11-BGP-Based Three-Layer Injection Configuration Example for Bypass Single-Device Multi-Channel Deployment Example
- 12-BGP-Based Three-Layer Injection Configuration Example for Bypass Multi-Device Cluster Deployment Example
- 13-Bypass GRE Layer 3 Return Injection Configuration Example
- 14-Typical Configuration for HTTPS CC Protection Example
- Related Documents
-
| Title | Size | Download |
|---|---|---|
| 06-Typical Configuration Examples of Traction Management Example | 444.23 KB |
Configure the Diversion Script
Configure Blackhole Diversion Rules and Trigger Parameters
Verify the Global Total Traffic Diversion
Configure a Single IP Blackhole Diversion Rule
Introduction
Configuration Prerequisites
This document is not strictly version-bound to specific software or hardware. If discrepancies arise between the document and the actual product during use, always prioritize the device's actual status.
All configurations demonstrated in this document were tested in a laboratory environment, with all device parameters initialized to factory default settings prior to configuration. If you have previously configured the device, ensure that your existing settings do not conflict with the examples provided below to guarantee expected outcomes.
Configuration Examples
Network Requirements
This configuration takes a series deployment as an example. For detailed instructions, refer to "AFC Series Deployment Mode Configuration Examples".
The attacker and client access the network through router R1 to reach the protected host with IP addresses 200.0.0.100/24 to 200.0.0.109/24. Both attack traffic and legitimate client traffic will pass through the series-deployed AFC device.
Figure 0‑1 AFC Series Deployment Mode Configuration Topology
Configuration Approach
Configuration Steps
Add Steering Device
In [Protection] > [Steer Config] > [Steering Device], click "Add". Fill in the following details:
- Device Name: Customizable (user-defined)
- R1 Management Address: IP address of router R1
- Device Port: Management port of the diversion device
The diversion device supports connection via Telnet, SSH, or WebService protocols.
Figure 0‑2 Add Steering Device
Configure the Diversion Script
[Protection] > [Steer Config] >[Steering Operations] click "Add", and fill in the information as shown in the figure below.
Figure 0‑3 Configure the Diversion Script
Example:
To divert traffic to router R1, which is an H3C router with IP address
184.0.0.1/24, username "admin", and password "admin",
configure the diversion script to direct traffic to R1's blackhole route as
follows:
[-TELNET 184.0.0.1-]
admin
admin
<Sysname> system
[Sysname] ip route-static #IP# 32 null0
[Sysname] quit
<Sysname> save
<Sysname> quit
Configure Blackhole Diversion Rules and Trigger Parameters
Figure 0‑4 Blackhole Policy
· Name: Define the policy name;
· Trigger duration time: The time it takes to trigger the traffic threshold or packet count threshold. Once this value is reached, the associated diversion operation in the lower-left corner will be executed. Usually, keep this at 0 to execute the diversion operation immediately;
· First duration time: The duration for which the server is diverted;
· Traffic Iimitation: The traffic threshold preset by the administrator. Here, judgment is made solely based on the size of the traffic;
· Packet limitation: The packet count threshold preset by the administrator;
· Unsteering mode: Select Mode One, after the server diversion time ends, it will immediately perform anti-diversion; Select Mode Two, the administrator can set two additional parameters: traffic threshold or packet count threshold. Then, at the end of the diversion time, it will perform this parameter judgment again, and only if it is less than this threshold, will it execute anti-diversion;
· Total Steered Traffic: Check the activation option box, which will automatically select the global option. In the local option box, you can set the diversion lower limit, indicating that when the policy threshold is triggered, it will judge whether the traffic of the IP with the largest traffic is greater than this value. Only if it is greater than this value will the diversion operation be executed.
· Select Steering Device Operation: Select the diversion operation to be performed after triggering the policy, usually to block the IP on the upper-layer switch.
Global Total
Traffic: After entering the corresponding
value for global total traffic, the system checks whether the global total
traffic exceeds the set threshold. If it does, traffic diversion is performed
according to the configured diversion rules. This parameter is set to defend
against segment scanning attacks, where the traffic of individual hosts is low,
but the overall global traffic is high.
Note: Used in conjunction with the global total traffic parameter,
after the first host diversion is completed, the system checks whether the
current total traffic exceeds the "Global Total Traffic" threshold.
If it does, a second diversion is performed; otherwise, no further diversion
will occur.
Verification of Configuration
Verify the Global Total Traffic Diversion
Figure 0‑5 Host Status Before Diversion
Configure blackhole diversion rules as follows:
Figure 0‑6 Global Total Traffic Diversion Configuration
Upon successful diversion, the diverted host(s) will be displayed in the diversion list.
Figure 0‑7 Blackhole Status
After diversion, a static route to null0 can be seen on R1:
Figure 0‑8 Blackhole Route
If the diversion is unsuccessful, you can view the logs in the command log of the diversion list.
Figure 0‑9 Command Log
Figure 0‑10 Connection timeout or command error between the AFC device and the blackhole device.
Configure a Single IP Blackhole Diversion Rule
The rest is the same as 3.4.1. Configure the blackhole diversion rule as follows:
Figure 0‑11 Single IP Triggered Traffic Diversion Configuration











