SECS03L04 - Securing The Data Plane
SECS03L04 - Securing The Data Plane
Foundation Protection
ACLs
– FPM
uRPF
– For antispoofing mitigation
QoS
– Class-based policing
Slammer
Filter Match
t!
er
Al
PHDF
+
Custom Filters Attacker
Administrator
System Under
Attack
IP Header
1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 2 3 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
Version
IHL TOS Total Length
Source IP Address
Destination IP Address
Load a PHDF
– For header field matching
Create a traffic class
– Define a protocol stack and specify exact parameters to match
– Using class map type “stack” and “access-control”
Create a traffic policy
– Define a service policy
Apply the service policy to an interface
Fa0/1
Attacker
System Under
Attack
There have been many well-known attacks that have affected the
data plane of infrastructure devices.
There are several tools used to secure the data plane.
FPM is one tool used to protect the data forwarding plane.
There are several steps used to configure FPM.
There are several show commands used to verify FPM.
Use debug commands are used to troubleshoot FPM.