Cisco Secure DDoS Edge Protection DEVNET Demo Guide

Available Languages

Download Options

  • PDF
    (10.4 MB)
    View with Adobe Reader on a variety of devices
Updated:January 18, 2022

Bias-Free Language

The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.

Available Languages

Download Options

  • PDF
    (10.4 MB)
    View with Adobe Reader on a variety of devices
Updated:January 18, 2022
 

 

Goals of this document

The goal of this document is to demonstrate Cisco Secure DDoS Edge Protection® in service provider mobile and peering environments. After this lab, the user should be familiar with Cisco Secure DDoS Edge Protection, an industry-leading technology that blocks distributed-denial-of-service (DDoS) attacks at the network edge, enabling service providers to meet the sub-10-ms latency requirements of modern 5G networks and ensuring customer quality of experience (QoE).

This demo guide will provide an overview of the Edge Protection controller, which provides centralized management of one (1) or more Edge Protection detectors. The controller also provides the visualization of the status of each detector and any ongoing attacks in the network.

Upon completion of this lab, you should be able to demonstrate the value of deploying Cisco Secure DDoS Edge Protection in your customer’s network to protect them and their customers from service interruptions due to DDoS attacks.

Scheduling the Sandbox

This lab is meant to be run on the DEVNET Sandbox environment. To schedule the Sandbox, you will need to reserve the Cisco IOS® XR and Edge Protection Sandbox.

For information about how to reserve a DEVNET Sandbox, go to:

https://developer.cisco.com/docs/sandbox/#!getting-started/try-it-out.

To book a Sandbox, go to https://developer.cisco.com/site/sandbox/, click “Get Started with Sandbox,” and search for the

“DDoS Edge Protection” sandbox.

Related image, diagram or screenshot

Connecting to the Sandbox

Once the Sandbox has been scheduled, an automated email will be sent to the user with the VPN URL and the credentials to log in. The Cisco AnyConnect® client is required to be installed on the student’s computer to connect to the DEVNET Sandbox environment. If you don’t have AnyConnect installed, the email sent with the login information will also provide a link to download the AnyConnect client.

Overview

In this lab, we will be protecting a mobile edge network environment from malicious attacks that are hidden inside GTP packets.

We will review the Controller Dashboard and other menus. Once we have familiarized ourselves with the controller interface, we will launch traffic from a legitimate user and will review the relevant information and statistics. Then we will launch malicious traffic from another device and see how the Edge Protection solution almost immediately protects the network by identifying and mitigating this traffic.

The following describes the solution architecture:

In this lab, there are both legitimate and malicious (attacker) devices that connect to an application that’s behind a Cisco® NCS 540 router. On this NCS 540, there is a Cisco Secure DDoS Edge Protection detector deployed that analyzes all the flows of data being received by the router. The Edge Protection detector is controlled and managed by the Edge Protection controller. Visibility into the traffic passing through the detector can be observed on the controller graphical user interface.

Related image, diagram or screenshot

Device credentials:

Device

Username

Password

MGT access

Cisco NCS 540

client

cisco123

10.10.20.53

Controller HTTP

admin@example.com

12345

http://10.10.20.51.nip.io

Legit user

root

Nirvan!Nevermind_1991

10.10.20.55

Attack user

root

Nirvan!Nevermind_1991

10.10.20.65

Protect application

root

Nirvan!Nevermind_1991

10.10.20.75

Objectives

      Gain familiarity with the Edge Protection controller interface

      Launch legitimate traffic and see how it is viewed within the Edge Protection controller interface

      Launch attack traffic and see how it is easily and quickly detected by the Edge Protection detector

      Block attack traffic

Prerequisites

No prerequisites are required, but having knowledge of the challenges that the DDoS poses for enterprise and service provider customers and networks will help the student appreciate the value that Edge Protection offers customers.

Applications needed:

      Cisco AnyConnect client (link provided in email)

      Web browser

      SSH program, such as Putty

Terminology

This document uses the following terms with which you must be familiar:

    Controller - A central management function and a user Interface that manages a fleet of one or more detectors. The controller includes a GUI dashboard that presents real-time attack information for detector visibility, forensics, and threat intelligence analysis.

    Detector - DDoS detection and mitigation are functions implemented on a virtual Docker container as a microservice application. The function runs independently on the designated edge router.

    GTP – GPRS Tunneling Protocol defined by the 3GPP standards to carry packets between mobile function zones in 3G/4G and 5G.

Note:      From this point on, you will need to be connected to IOS XR and Edge Protection Sandbox.

Step 1: Reviewing the controller

Open Chrome (or other browser) and connect to the Edge Protection controller, http://10.10.20.51.nip.io.

For the email, enter admin@example.com, and for the password, use: 12345. Then click “Login.”

Related image, diagram or screenshot

Once logged in, you will be in the Controller Dashboard.

Related image, diagram or screenshot

Along the left side of the page is the navigation bar, which allows access to different menus.

The section being displayed has a light-blue background. As you can see, we are in the dashboard Related image, diagram or screenshot.
The dashboard provides an overview of your environment. It shows the number of detectors, whether any detectors are under attack, and the total amount of both legitimate and attack traffic.

Scroll down to see more information in the dashboard.

Related image, diagram or screenshot

In the top right-hand corner of the dashboard, we see the number of detectors, and, by default, we also visually see their overall status. We also have the option to view by attack severity. In the example below, there is one (1) detector, and the status is green, indicating that it is active. When we click on the attack severity, it is also green, indicating that the network is not under attack.

Related image, diagram or screenshot

Looking at the “Traffic Through Routers” graph below under “System,” we notice that no traffic is shown. The default time window is the last five minutes, but this can be changed by clicking on the dropdown menu on the top right of the graph.

Related image, diagram or screenshot

To the left of the “System > Traffic Through Routers” graph, we see the ongoing attacks graph. As shown below, there are also no attacks.

Related image, diagram or screenshot

Scrolling down in the dashboard page, we get an overview of the protected objects (POs). Starting on the left, we can see the POs by type.

There are two (2) POs defined. One PO is defined by destination IP, none by the source IP, and one by router. We will get more details about this PO on the Protected Objects page.

Related image, diagram or screenshot

The “PO’s Under Attack” widget provides information on how many of the POs are under attack. Presently there are none under attack.

Related image, diagram or screenshot

Finally, on the dashboard under “Protected Objects,” we can see the number of IP ranges in our POs. In this case, it is one.

Related image, diagram or screenshot

We will now review the Detectors menu page. Click on the Detector Icon Related image, diagram or screenshot on the left-hand side of the screen.

Related image, diagram or screenshot

We see one detector with the status of green. Looking to the right, we can see the status for Deployment, Container, and Configuration. The green arrows indicate that all three are working correctly. See the enlargements below.

Related image, diagram or screenshot

To add more detectors, one can click on the Related image, diagram or screenshot icon and fill in the required fields for the router in which we would want to deploy the Edge Protection detector. We can also edit/view the existing detector details by clicking on the Related image, diagram or screenshot icon to the right-hand side of the detector row and selecting “Edit.”

Related image, diagram or screenshot

In the Edit Detector menu, we have three (3) tabs: Info, Main Configuration, and Security Configuration. Only the Info and Main Configuration need to be configured. The Security Configuration can be left at the default settings and only needs to be tweaked as necessary.

Related image, diagram or screenshot

Click on the “Cancel” button Related image, diagram or screenshot on the bottom right

Now click on the graph Related image, diagram or screenshot icon to the left of the Related image, diagram or screenshot 

Here we get details specific to an individual detector. This page will be more interesting once we have both legitimate and attack traffic going through this particular router being monitored by the detector.

Related image, diagram or screenshot

Click on the Attacks icon Related image, diagram or screenshot. Here we see the active attacks. This page is empty at the current time.

Related image, diagram or screenshot

Next, click on the Protected Objects icon Related image, diagram or screenshot. Here we can view the two POs, the default PO and one manually configured object called Protected-1. To create more POs, we would click on the Related image, diagram or screenshot located on the top right.

Related image, diagram or screenshot

 

Related image, diagram or screenshot

Click on the Related image, diagram or screenshot at the end of the row f or the Protected-1 object, and then click “Edit.”

We can see the details for this PO. We see that the type is a destination IP (Dst). We can see that the value of the IP is 15.15.1.0/8 and, below that, the thresholds that classify an attack as medium or high severity. Click “Cancel.”

Related image, diagram or screenshot

At the bottom left, we see information regarding the Edge Protection controller itself. Click on the Related image, diagram or screenshot icon. Here we can see the details of the software that is installed on the various engines of the controller.

Related image, diagram or screenshot

Click on the Related image, diagram or screenshot icon. From the Settings page, you can access templates for the detectors, create users, and add the licensing.

Related image, diagram or screenshot

Finally, the last icon is the Exit Controller icon Related image, diagram or screenshot, which will log off the user from the controller.

Step 2: Generating traffic

Now that we are familiar with the Edge Protection controller interface, it is time to generate traffic from the legitimate user. We will be sending traffic to the protected application on the right of the diagram below.

Related image, diagram or screenshot

SSH into the legit system with the IP address of 10.10.20.55 and the following credentials:

Username: root

Password: Nirvana!Nevermind_1991

If prompted with a security alert, click “Accept.” This happens because it is your first time connecting to this device securely.

Related image, diagram or screenshot

Move into the ddos-work directory with the following command:

cd ddos-work

Now execute the script called run-legit-traffic.sh:

./run-legit-traffic.sh

The Kali Linux box will now generate traffic and send it to the protected object.

Related image, diagram or screenshot

Notice in the above image, the HPING command shows a destination IP address of 172.20.10.10. This is the final destination of the packet that has been encapsulated in the GPRS tunnel protocol (GTP). The GTP tunnel endpoint is 10.10.22.76, which can be clearly seen in the packet capture below.

Related image, diagram or screenshot

Now let’s go back to the controller graphical user interface (GUI) portal and review some of the widgets. Open Chrome (or other browser) and connect to the Edge Protection controller: http://10.10.20.51.nip.io. For the email, enter admin@example.com, and for the password, use: 12345. Then click “Login.”

Related image, diagram or screenshot

After logging in, we can see traffic. See the blue line in the “System > Traffic Through Routers” pane two screenshots below.

Related image, diagram or screenshot

We can change the time from “Last 5 minutes” to “1 hour” (top right of the widget) to see the traffic going from 0 to over 2 Gbps.

Related image, diagram or screenshot

Click on the Detector icon Related image, diagram or screenshot on the left-hand side of the screen. Then click on the graph icon Related image, diagram or screenshoton the right-hand side of the detector row.

Related image, diagram or screenshot

We can obtain a lot of information about what is being seen by the detector.

Related image, diagram or screenshot

Starting from the top left, we can see telemetry statistics, which show the number of frames per second (fps), packets per second (pps), and the bandwidth that is used to collect statistics (telemetry) from the router.

Click on the time filter to notice that these statistics are for the last five minutes. We can change this range from one minute up to seven days.

Related image, diagram or screenshot

We can also see the amount of CPU and memory being consumed by the detector. Note that the CPU can be over 100%. Since there are two (2) CPUs, the range is up to 200% (2 x 100%).

Related image, diagram or screenshot

On the top right, the traffic is broken down by type. We can see that all the traffic is TCP.

Related image, diagram or screenshot

Scrolling further down in the page, notice a bar graph with quantiles. This shows the traffic being broken down into blocks. These blocks are known as quantiles. The quantiles are then analyzed by the detector for anomalies and attacks.

Related image, diagram or screenshot

Just below the quantile traffic graph we have the “Total Traffic BPS,” “Total Traffic PPS,” and “Traffic by Protocol” graphs.

Related image, diagram or screenshot

Scrolling right to the end of the page we get a list of top talkers.

Related image, diagram or screenshot

Let’s launch an attack. Please go to the next step.DevNet

Step 3: Detecting an attack

We are now going to launch an attack. We want to keep the legitimate traffic going, so make sure you have not stopped the script from the legitimate server. If required, return to the previous section to see how to launch the legitimate traffic.

Related image, diagram or screenshot

First lets log in to the Cisco NCS 540 Router and take a look at the access-list policy that has been preconfigured.

SSH into Cisco NCS 540 with the IP address of 10.10.20.53 and use the following credentials:

Username: client

Password: cisco123

If prompted with a security alert, click “Accept.” This happens because it is your first time connecting to this device securely

Related image, diagram or screenshot

Run the following command on the router to view the GTP access-list:

show access-list gtp

Presently there are three entries in the GTP access-list.

Related image, diagram or screenshot

Now SSH into the attacker system with the IP address of 10.10.20.65 and the following credentials:

Username: root

Password: Nirvana!Nevermind_1991

If prompted with a security alert, click “Accept.” This happens because it is your first time connecting to this device securely.

Related image, diagram or screenshot

Move into the ddos-work directory with the following command:

cd ddos-work

Now execute the script called ddos-udp-target-15.15.1.1.sh:

./ddos-udp-target-15.15.1.1.sh

The Kali Linux box will now generate traffic and send it to the protected object. Notice that the IP of traffic being sent is 15.15.1.1. This is the IP of the protected application server itself.

Related image, diagram or screenshot

Now let’s go back to the controller GUI portal and review some of the widgets.

Open Chrome (or other browser) and connect to the Edge Protection Controller: http://10.10.20.51.nip.io.

For the email, enter admin@example.com, and for the password, use: 12345. Then click “Login.”

Related image, diagram or screenshot

Click “Attack Severity.” Related image, diagram or screenshot

“Detectors by Attack Severity” is now red (if yellow, wait another minute), indicating that an attack has been detected.

Related image, diagram or screenshot

Click on the “1” and you will be redirected to the Detectors page. Notice that the graph is now red.

Related image, diagram or screenshot

Click on the graph. Notice that, in the bar graph for “Quantiles Traffic Percentage,” we see some red quantiles. These are the quantiles where the attack has been detected.

Related image, diagram or screenshot

Scroll down on your screen to see additional widgets that provide information about the network traffic.

Related image, diagram or screenshot

In the “Traffic by Protocol” graph, we now see TCP and UDP traffic.

Related image, diagram or screenshot

Below we now see logs indicating warning.

Related image, diagram or screenshot

We now see the attacker machine as a top talker.

Related image, diagram or screenshot

Click on the Attacks icon Related image, diagram or screenshot. We now see an active attack.

Related image, diagram or screenshot

Note that the green shield in the upper right is flashing, indicating that an attack has been detected, but that the mitigation needs to be activated manually. This can also be set to automatic; however, mitigation would occur so quickly that the user would most likely miss viewing the attack. Therefore, for this lab, the mitigation has been set to user manual activation.

Related image, diagram or screenshot

Click on the shield to view more details of the attack that has been detected. Analyzing this interface, we can see that there are ten (10) attackers and zero (0) have been mitigated. To the right of “Attackers and Mitigated Attackers,” we have the option of manually starting a mitigation on a particular attacker.

Related image, diagram or screenshot

If you hover your mouse over the graph labeled “Total Attack Traffic,” you will see the amount of total attack traffic and how much of that traffic has be mitigated. As you can see, no traffic has been mitigated yet.

Related image, diagram or screenshot

Click on the Related image, diagram or screenshot icon in the upper right of the screen and click “Start Mitigation.”

Related image, diagram or screenshot

Click the “Start” button. Now all attackers will be mitigated.

Related image, diagram or screenshot

The green shield has stopped flashing, and we see that “# Mitigated Attackers” shows “10,” matching the number of attackers. This confirms that all attackers are now being mitigated. We can also stop a particular attacker from being mitigated by clicking the “Release Mitigation” button to the right of a particular attacker under the heading “Attackers and Mitigated Attackers” section.

Related image, diagram or screenshot

Changing the view from “Last 1 Minute” to “Last 5 Minutes,” we can get a better view of the total attack traffic ramp-up.

Related image, diagram or screenshot

 

Related image, diagram or screenshot

We can also view the attack signature that was created based on the attack traffic. The attack analysis shows a source address of 10.10.20.65, destination address of 15.15.1.1, protocol UDP port 53, and time to live (TTL) of 64.

Related image, diagram or screenshot

Clicking on the box with the arrow pointing out (see image above) provides a cleaner view of the attack signature detected.

Related image, diagram or screenshot

Now go back to your SSH session to the NCS 540 router (if closed, open it again) and look at the GTP
access-list:

show access-list gtp

The GTP access-list has been updated with ten (10) new deny policies blocking the malicious traffic. Looking at each of the new lines in the ACL (below), each malicious GTP tunnel endpoint ID has been blocked (example: 0x8 GTP tunnel endpoint ID).

Related image, diagram or screenshot

Going back to the Controller Dashboard we can see that a device is still under attack. Note that in a real attack, multiple devices would most likely be under attack. Although we are protecting the network by mitigating the attack, the network is still under attack.

Related image, diagram or screenshot

Scroll down on the Dashboard page to the Protected Objects section.

Related image, diagram or screenshot

Click on the “1” in the “PO’s Under Attack” screen.

Related image, diagram or screenshot

This will take you into a filter view of the Protected Objects page, showing only the PO that is under attack.

Related image, diagram or screenshot

Click on the “>” symbol to view details of the PO.

Related image, diagram or screenshot

Step 4: Stopping the attack

Now we would like to stop the attack. Use CTRL+ Z to stop the attack.

Related image, diagram or screenshot

Please make sure that the attack script has stopped. Sometimes the script continues to run even though the terminal shows stopped. If you don’t see the attack traffic stop in the Controller Dashboard, it is possible that the script is continuing to run and the process needs to be manually stopped (killed). The first step is to find the process ID.

To find the process ID of the hping4 attack script, use the following command:

ps -a

Look for the PID that says hping4. In the example below, it is 1127. Then kill that process by running the kill command:

kill -9 <PID>

In the example below:

kill -9 1127

Related image, diagram or screenshot

Once the attack has stopped, the controller will still report the router as under attack for a few minutes until it is certain that the attack has been terminated. Going back to the Detectors page and clicking on the detector, we can now see that there no longer is any UDP traffic. The quantile bar graph is no longer showing any red bars, indicating that none of the quantiles are malicious.

Related image, diagram or screenshot

Scrolling further down on the Detectors page, we also see that we no longer have any logs and that the top talkers are now all coming from our legitimate user.

Related image, diagram or screenshot

Click on the Protected Objects icon Related image, diagram or screenshot.

Related image, diagram or screenshot

Notice that “Mode” is set to “User Confirmation.”

Related image, diagram or screenshot

In a live environment, this would be changed to automatic, as we want to minimize the time between when the attack is detected and when it is stopped, or mitigated. When set to automatic, the attack is stopped within seconds.

Related image, diagram or screenshot

Let’s go back to the dashboard. Be sure to wait at least five minutes after the attack is stopped. We now see that the router is not under attack, and looking at “System > Traffic Through Routers,” we see the red line (attack traffic) going down to zero (0).

Related image, diagram or screenshot

If we go back to the Detectors screen, we see the graph on the right-hand side has changed from red to blue, indicating that there is no attack on this detector.

Related image, diagram or screenshot

Going to the Attacks screen, we also see no attacks listed on this screen.

Related image, diagram or screenshot

Finally, checking the Cisco NCS 540 GTP access-list, we see that the deny statements have been removed since there no longer is an attack on the network:

show access-list gtp

Related image, diagram or screenshot

You have now completed the Cisco Secure DDoS Edge Protection Lab. Feel free to explore more of the user interface.

Resources

For more information about Cisco Secure DDoS Edge Protection, see:

      Cisco Secure DDoS Edge Protection on DEVNET:
https://developer.cisco.com/docs/secure-ddos-edge-protection

      Cisco Secure DDoS Edge Protection AAG:
www.cisco.com/c/en/us/products/collateral/security/secure-ddos-edge-protection-aag.pdf

      Cisco Secure DDoS webpage: www.cisco.com/go/secure-ddos

      Edge Protection Support email alias: secure-ddos-edge-protection@external.cisco.com

      For information about Cisco security solutions that enable Any Device, go to: www.cisco.com/go/security

 

 

 

Learn more