Using Policy Routing to stop DoS attacks

Christian Liendo cliendo at globix.com
Tue Mar 25 14:58:39 UTC 2003


At 09:21 AM 3/25/2003 -0500, Haesu wrote:

>I dunno how you want to implement this; but as far as I know, the way most
>people generally do policy routing on cisco thru routemap is they define
>the source IP's via access-list... Does that make a huge difference than
>regular access lists? I dunno...
Well yes, It seems that an IP deny is more process intensive than an IP 
permit. I do not claim to know why. I have just seen it myself.

Anyway depending on the attack with large numbers of packets sometimes the 
CPU is so high you can get knocked off the router.
I wanted to see if policy routing is less taxing on the router.

With the access-list for a policy route map you have a access-list permit, 
so I figured it might be less taxing.



>Which Cisco router ? IOS ?
>  HW/SW/CEF/netflow/<whatver>  "IP switching"  ?
While I have had this problem on different routers the ones I constantly 
have it on are Cisco Cat 5000s with RSMs(RSP4). I have tried different 
codes, I am currently at 12.04. But it's not a code issue. It's just a 
limitation of the router. I just need something less taxing on the router.

I just need to know if anyone has already done this.






More information about the NANOG mailing list