For feedback, use the following:
ipd_online_feedback@alcatel-lucent.com
Table of Contents Previous Next Index PDF


Threat Management Service
In This Section
This section describes how to configure the Threat Management Service applications.
Topics include:
TMS Service Introduction
The ISA-TMS supports routed redirect mode on IOM3, which means that traffic based on destination IP address (under attack) is filtered (scrubbed) by a variety of DDoS filtering rules provided by 3rd party code from Arbor Networks.
When a DDoS attack is detected by the Arbor Networks CP (based on cflowd counters) a notification is send to the 7750 SR CPM. This is the trigger for the 7750 SR CPM to attract the traffic under attack via the advertisement of a route with prefix the destination IP address under attack and with next-hop the scrubber. This process is called off-ramping.
At that point all destination traffic to the IP address under attack is forwarded to the 7750 SR where:
Configuration Guidelines and Example
 
TMS Image Location
The TMS images should be stored in the same location as the other images (cpm.tim, iom.tim, etc). This is to where the BOF points.
The name of the file is peakflow-tms.tim
 
Configuration Example For TMS Interfaces on the SR OS
configure service vprn 1
tms-interface "mda-1-1" create
address 20.12.0.43/32
description "tms-1-1"
port 1/1
password "password=arbor zone-secret=admin"
exit
exit
 
configure router
interface "itfToArborCP"
address 10.12.0.1/24
port 3/2/4
exit
exit
 
configure router policy-options
policy-statement "exporttmsgrt"
entry 1
from
protocol vpn-leak
exit
action accept
exit
exit
entry 2
from
protocol tms
exit
action accept
exit
exit
exit
exit
 
 
Follow the usage guidelines listed below:
Use mda-type isa-tms
         *A:Dut-C# show router route-table 20.12.0.43/32 
 
===============================================================================
Route Table (Router: Base)
===============================================================================
Dest Prefix[Flags] Type Proto Age Pref
Next Hop[Interface Name] Metric
-------------------------------------------------------------------------------
20.12.0.43/32 Remote Static 00h08m49s 5
vprn1:mda-1-1 1
-------------------------------------------------------------------------------
Use a TMS cluster which holds the relevant isa-tms’ Administration> Mitigation> TMS-ISA Clusters
Put the TMS cluster in a TMS group Administration> Mitigation> TMS Groups
Use the TMS Group in the mitigation rule (Mitigation> Threat Management>Add> TMS Appliances)