Control Plane
CoPP – Control Plane Policing
Control Plane Policing is used to apply policy maps to traffic going to or coming from the control plane. This feature also mitigates DoS attacks by filtering traffic that arrives at the processor. First, you should define a policy-map using MQC. Then, apply this policy map to the control-plane:
To monitor Control Plan Policing use:
CoPPr – Control Plane Protection
Control Plane Protection is similar to the policing feature, except it offers a more granular access to the control plane functions. You still need to define a policy-map using MQC. But now you can apply it on a sub-interface of the virtual control-plane interface:
Layer 4 Port Protection
On the host subinterface you can use a special type of policy-map to deny access-to specific ports. First create the special class-map and policy-map:
The closed-ports keyword should mean all ports that are not open on the control plane. Filtering traffic to the closed ports should spare the processor from unnecessary work. To see a list of open ports, use:
Beware of the fact that some protocols (usually routing protocols) will not show up with open ports, so they should be specifically allowed if they are used. Then create the policy map:
In the end, apply it on the host subinterface:
Queue Threshold Protection
Similar to the previous feature, you can set how long the queue of the control-plane host subinterface can be. Follow these steps to define the class-map and the policy-map:
Then, apply it on the host subinterface:
Management Interfaces
Additionally, on the host subinterface, you can define what management protocols are allowed on each physical interface:
Control Plane Logging
For traffic that arrives at the control plane (that is traffic that is not cef-switched), the control-plane can limit the amount of logging it does. To enable this feature, first define a logging class-map and policy-map:
Apply the logging policy-map to the control plane interface or one of its subinterfaces:
Last updated