Want to enable Feature EPFT with “routing-protocols-enable”. However ,it is throwing an error and ask to configure the following command: “non-subscriber-interfaces mac” which once enabled drops the traffic without any penalty.
EPFT for routing-protocols can be enabled with “non-subscriber-interfaces mac” command only which means bad actor identification will be done on mac basis .When a bad actor is identified based on mac there will be complete drop no penalty policing will be done for penalty policing to happen please change the config as “non-subscriber-interfaces”.
The complete drop is for traffic from bad actor. All other mac on the interface should be able to pass traffic via the interface.
My understanding of enabling ‘routing-protcols-enable’ for EPFT is that itpreventsrouting protocols (eg: BGP) from triggering any ‘bad actor’ condition; Is that correct?
Without enabling "routing-protocols-enable" command:
> EPFT functionality bypasses all routing protocols by default. This is done to explicitly avoid dropping of necessary control-plane packets like route updates. Control-plane is already protected via LPTS.
> By default EPFT is not enabled, thus BGP packets <updates> will not fall under penalty as per design. By default LPTS has configured rate for BGP packets to be policed if it goes over the limit.
The correct command to check the same is following:
show lpts pifib hardware police location <>
show lpts pifib dynamic-flows statistics location <>
show lpts pifib hardware entry location <> | be <SIP>
SIP > Source IP with which peering is done and who sent big updates to check the rate of traffic.
Once EPFT for routing protocols is enabled:
lpts punt excessive-flow-trap non-subscriber-interfaces mac^ routing-protocols-enable
> EPFT, if enabled for routing-protocols can cause issues with dropping the traffic frombad actor<which can be updates if sent at a very high rate, and are not expected>. Usually normal updates are never identified as bad actor.
*Bad actoris a term to state a user sending huge amount of “for-us” traffic
My understanding is also that it’s correct behaviour for the above knob to only be useable in conjunction with ‘non-subscriber-interfaces mac’ enabled.
The EPFT feature for routing protocols issupported only with non subscriber mac interfaces.
It only supports source based MAC filtering.
Once a bad actor is identified all the traffic with that particular source will be dropped for penalty-timeout which can be modified as follows:
lpts punt excessive-flow-trap
penalty-rate arp 10
penalty-rate icmp 0
penalty-rate igmp 50
penalty-rate ip 100
penalty-timeout ospf 0
penalty-timeout bgp 0
exclude interface <back_bone_interface> // Can exclude both physical and sub-interface
Want to confirm why the default parameters are set <seen by the output of command “show lpts punt exc info” >though EPFT is not configured?
The output of this command is just to let us know that once EPFT is enabled than following parameters will be set which can be changed by using commands. If we want to see whether EPFT is enabled or not. It can be confirmed via following command:
- Show lpts punt excessive-flow-trap trace | in Elephant
- Show lpts punt excessive-flow-trap trace | in routing_protocol_enable >> it should have value =1
>> The output will show Elephant trap enabled or disabled and it will also show various parameters for which it is enabled once configured.
Hi All, I have 15 Cisco phones model SPA502G in the company and i'm connecting them to the PBX by IP address and subnet mask. Now i purchased new phone model 8845 but i couldn't registered the phone in the same way as it's required CUCM QR to r...
I have ASR100x devices with ISG (iWAG) using multi vrf, services loading via Radius.Is it possible to use mdns routing features of IOS XE on ASR with that configuration? Or these features are incompatible (mdsn and isg)?
Hi All, I have tried to update the below sysadmin's SMU on ASR9K, but got the below error when "install add", is there any other method to install those sysadmin's SMU? RP/0/RSP0/CPU0:ios(admin)#install add harddisk:asr9k-sysadmin-6.5.3.CSC...
Hi, We have a POP with ASR 1002 for BNG and CGNAT.The problem is with the configuration of cgnat, we can't access the cpe from outside of asr by interface of uplink.We tried to accept by using an access list, but without success. Follow the conf...