<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Simulate DoS Attack in CML in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/simulate-dos-attack-in-cml/m-p/5092991#M1112182</link>
    <description>&lt;P&gt;Config CoPP rate&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And ping the device 10000&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This will test your CoPP ' it must drop this high rate of ping traffic&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
    <pubDate>Tue, 07 May 2024 18:08:50 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2024-05-07T18:08:50Z</dc:date>
    <item>
      <title>Simulate DoS Attack in CML</title>
      <link>https://community.cisco.com/t5/network-security/simulate-dos-attack-in-cml/m-p/5092990#M1112181</link>
      <description>&lt;P&gt;Hallo,&lt;/P&gt;&lt;P&gt;Is there a way to simulate a DoS attack in CML? I am doing a lab on CoPP and an attack is required but I am unable to generate this. Thanks.&lt;/P&gt;</description>
      <pubDate>Tue, 07 May 2024 18:07:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simulate-dos-attack-in-cml/m-p/5092990#M1112181</guid>
      <dc:creator>abc1235</dc:creator>
      <dc:date>2024-05-07T18:07:06Z</dc:date>
    </item>
    <item>
      <title>Re: Simulate DoS Attack in CML</title>
      <link>https://community.cisco.com/t5/network-security/simulate-dos-attack-in-cml/m-p/5092991#M1112182</link>
      <description>&lt;P&gt;Config CoPP rate&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And ping the device 10000&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This will test your CoPP ' it must drop this high rate of ping traffic&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Tue, 07 May 2024 18:08:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simulate-dos-attack-in-cml/m-p/5092991#M1112182</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-05-07T18:08:50Z</dc:date>
    </item>
    <item>
      <title>Re: Simulate DoS Attack in CML</title>
      <link>https://community.cisco.com/t5/network-security/simulate-dos-attack-in-cml/m-p/5092993#M1112183</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Joy3_0-1715105588808.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/217771iB3E74B98C39F7C8F/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Joy3_0-1715105588808.png" alt="Joy3_0-1715105588808.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp;Thanks for the quick response but I don't quite understand what you mean. Above is the simple topology and the attcket should be from extern. Could you clarify more.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 07 May 2024 18:15:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simulate-dos-attack-in-cml/m-p/5092993#M1112183</guid>
      <dc:creator>abc1235</dc:creator>
      <dc:date>2024-05-07T18:15:18Z</dc:date>
    </item>
    <item>
      <title>Re: Simulate DoS Attack in CML</title>
      <link>https://community.cisco.com/t5/network-security/simulate-dos-attack-in-cml/m-p/5093461#M1112186</link>
      <description>&lt;P&gt;you can use like kali linux as attacker:&lt;/P&gt;
&lt;P&gt;check kali Linux integration with CML&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/cisco-modeling-labs-discussions/kali-server-on-cml2/td-p/4450129" target="_blank"&gt;https://community.cisco.com/t5/cisco-modeling-labs-discussions/kali-server-on-cml2/td-p/4450129&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 08 May 2024 06:10:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simulate-dos-attack-in-cml/m-p/5093461#M1112186</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2024-05-08T06:10:45Z</dc:date>
    </item>
    <item>
      <title>Re: Simulate DoS Attack in CML</title>
      <link>https://community.cisco.com/t5/network-security/simulate-dos-attack-in-cml/m-p/5093483#M1112187</link>
      <description>&lt;P&gt;From extern ping 10000 to R1&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 08 May 2024 06:28:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simulate-dos-attack-in-cml/m-p/5093483#M1112187</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-05-08T06:28:11Z</dc:date>
    </item>
    <item>
      <title>Re: Simulate DoS Attack in CML</title>
      <link>https://community.cisco.com/t5/network-security/simulate-dos-attack-in-cml/m-p/5094082#M1112217</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp;Thank you, I have used a router to send many icmp packets and a few are dropping , which is what I wanted to test. Thanks so much for always being helpful.&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/286878"&gt;@balaji.bandi&lt;/a&gt;&amp;nbsp;Thanks for the suggestion. It will require a bit of effort to get it done but I have found a workaround.&lt;/P&gt;</description>
      <pubDate>Wed, 08 May 2024 11:38:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simulate-dos-attack-in-cml/m-p/5094082#M1112217</guid>
      <dc:creator>abc1235</dc:creator>
      <dc:date>2024-05-08T11:38:53Z</dc:date>
    </item>
    <item>
      <title>Re: Simulate DoS Attack in CML</title>
      <link>https://community.cisco.com/t5/network-security/simulate-dos-attack-in-cml/m-p/5094121#M1112223</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp;Just a curious question. I have explicitly denied icmp packets in the access-list on R2 and applied it in the control plane. However, when R1 pings R2, it only drops a few packets. Why is that so? Part of the config is below:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Joy3_0-1715169347275.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/217809iFE8520A94FEFB44D/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Joy3_0-1715169347275.png" alt="Joy3_0-1715169347275.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;-------on R2-----------&lt;/P&gt;&lt;P&gt;ip access-list extended ICMP&lt;BR /&gt;deny icmp any any&lt;/P&gt;&lt;P&gt;class-map match-all ICMPC&lt;BR /&gt;match access-group name ICMP&lt;/P&gt;&lt;P&gt;policy-map ICMPP&lt;BR /&gt;class ICMPC&lt;BR /&gt;police 8000 conform-action transmit exceed-action drop&lt;/P&gt;&lt;P&gt;control-plane&lt;BR /&gt;service-policy input ICMPP&lt;BR /&gt;_______________________________________________________________________&lt;/P&gt;&lt;P&gt;R1#ping 192.168.12.2 repeat 100&lt;BR /&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 100, 100-byte ICMP Echos to 192.168.12.2, timeout is 2 seconds:&lt;BR /&gt;!!!!!!!!!!!!!.!!!!!!!!!!!!!.!!!!!!!!!!!!!.!!!!!!!!!!!!!.!!!!!!!!!!!!!.&lt;BR /&gt;!!!!!!!!!!!!!.!!!!!!!!!!!!!.!!&lt;BR /&gt;Success rate is 93 percent (93/100), round-trip min/avg/max = 1/1/1 ms&lt;BR /&gt;R1#&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 May 2024 12:00:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simulate-dos-attack-in-cml/m-p/5094121#M1112223</guid>
      <dc:creator>abc1235</dc:creator>
      <dc:date>2024-05-08T12:00:27Z</dc:date>
    </item>
    <item>
      <title>Re: Simulate DoS Attack in CML</title>
      <link>https://community.cisco.com/t5/network-security/simulate-dos-attack-in-cml/m-p/5099431#M1112306</link>
      <description>&lt;P&gt;Hi friend&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;policy-map ICMPP&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;class ICMPC&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;police &lt;STRONG&gt;4000&lt;/STRONG&gt; conform-action transmit exceed-action drop&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Change the police to be 4000 and check ping loss you need to see now more ping loss&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;MHM&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 10 May 2024 10:16:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simulate-dos-attack-in-cml/m-p/5099431#M1112306</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-05-10T10:16:41Z</dc:date>
    </item>
  </channel>
</rss>

