DefenseFlow-peakflow Intergrated Case
DefenseFlow-peakflow Intergrated Case
Scenario Explanation
PeakFlow detection enables providers to use their own PeakFlow device as a detection with
DefenseFlow Security Control Plane.
In this scenario, you configure the ASR9K_PE router to send NetFlow statistics on the upstream
port towards PeakFlow. PeakFlow analyzes the netflow information and configures to send alert
to DefenseFlow when specific threshold is reached. Once DefenseFlow get the alert, it tiggers
the relevant Operation to mitigate the attack in the Scrubbing center.
Scenario Environment
3. PeakFlow detects the attack from the NetFlow statistics (60 seconds duration) and signals to
DefenseFlow.
4. DefenseFlow trigger the workflow and copies the template policies and the baselines to the
Scrubbing Center DefensePro.
Configurations
For more information regarding the DefenseFlow configuration blocks, refer to DefenseFlow
Configuration Review in DefenseFlow Demo Lab Preparation document.
Protected Object PO_250 is configured with action mode User Confirmation, the
protected network is 155.1.250.0/24, the PO workflow is
PeakFlowDetectionDiversionToSc , and DefenseFlow uses community 65000:150 to
advertise this PO:
Run a TCP SYN flood attack with a bandwidth rate of ~120M/350kpps. This attack should be
detected by PeakFlow within the next NetFlow update period (up to 60 seconds).
1. To run the attack, double-click the Kali Terminal icon in the management station desktop.
This opens a terminal window for the Kali station (for more information, see Legitimate
Traffic Generation Tools in DefenseFlow Demo Lab Preparation document).
2. Run the following command (write it in the Kali ):
hping3 155.1.250.155 --flood -S -p 80 --rand-source
This command floods the protected network server with port 80 SYN packets with random
sources.
3. Verify the attack packets in the attacked Web server, run the webserver capture
terminal in the management station desktop. This script displays a live capture of SYN
packets arriving at the webserver D station.
Note: The protected object action is configured with the User Confirmation action. To divert
the traffic to the mitigation device, confirm the action.
To mitigate the attack towards the Scrubbing Center, you need to confirm that the attack has
started.
1. Double click the pending action PO_250 in the Pending Actions pane. This displays the
attacked IP address. You can also change the community in the BGP advertisement.
3. After DefenseFlow finishes updating DefensePro, it advertises the protected object network
to the diversion router ASR9K_PE. Verify DefenseFlow announcements in APSolute Vision:
4. To verify the diversion, log in to the ASR router and run the following command:
Show bgp summary
7. Verify that there are no new SYN packets in the Web server capture terminal:
9. To revert diversion back from the Scrubbing Center, in the Pending Actions pane select
PO_250.
Note: you need to wait 1 to 2 minutes before you receive the End pending action.