We recently had a DDos attack on our network that flooded our network with UDP traffic taking our network and internet connections to a crawl. After this the effects were that random clients suddenly took up to an hour to login. We have 2 Cisco Cat 6509s as the core switches and Cat Cisco 400x, 2800, and 350x servicing our user base and there is no certain switch that it doesnt happen on. The client will login and it will load their profile for an hour. We changed the registry in the Kerberos key to use TCPrather than UDP for packets with a sizeover 1K (esentially all Kerberos packets) and now the clients work. We are rebooting are 6500s this weekend to clear out any possible "garrbage" that may have resulted from the attack. Has anyone seen this issue before???? Everything worked before the DDos so portfast trunking etc etc all were fine and worked and everything is still the same.
I am not too sure, if you resetting the catalyst boxes is going to help you in any way. The best way to handle the Dos attacks would be to have some IDS (Intrusion Detection Sensor) mechanism integrated in your network
Question We run asr9001 with XR 6.1.3, and we have a very long delay to
login w/ SSH 1 or 2 to the device compare to IOS device. After
investigation, the there is 1s delay between the client KEXDH_INIT and
the server (XR) KEXDH_REPLY. After debug ssh serv...
Introduction The purpose of this document is to demonstrate the Open
Shortest Path First (OSPF) behavior when the V-bit (Virtual-link bit) is
present in a non-backbone area. The V-bit is signaled in Type-1 LSA only
if the router is the endpoint of one or ...
Hi, I am seeing quite a few issues with patch install and wanted to
share my experience and workaround to this. Login to admin via CLI, then
access root with the “shell” command Issue “df –h” and you’ll probably
see the following directory full or nearly ...