Juniper SRX220防火牆CPU達到100%的故障解決辦法

Juniper SRX220防火牆CPU達到100%的故障解決辦法安全


1、背景網絡

     2016521日設備巡檢時發現廣東機構的防火牆SRX220CPU高達100%,可是設備還能管理,可是卡頓明顯,業運維

務尚未中斷ide


2、解決辦法spa


一、查看設備的告警信息,沒有告警。日誌

wKioL1eKW_Sy2ZekAABRb81immE094.jpg-wh_50


二、查看帶寬監控查看設備端口流量,均不高。orm


三、查看設備系統進程。server

wKioL1eKW_PQ3gRsAAKRX6iWmjM057.jpg-wh_50


四、查看設備的日誌信息。blog

wKiom1eKW_XRV2hSAAFqFuwyRUQ726.jpg-wh_50


五、與廠商工程師溝通,初步判斷是因爲NTP服務的開啓致使該端口被利用,發生在了NTP***。接口


六、關閉NTP配置,設備遠程管理再也不卡頓,可是CPU依然是100%


七、得知是被NTP DDOS***了,就在設備的Lo0接口上引用filter,配置完畢後設備的CPU恢復正常。

set firewall family inet filter To-ntp term 10 from  source-address x.x.79.36/32   //lo0地址

set firewall family inet filter To-ntp term 10 from  source-address x.x.2.65/32   //NTP server 地址

set firewall family inet filter To-ntp term 10 from  protocols udp

set firewall family inet filter To-ntp term 10 from  port ntp

set firewall family inet filter To-ntp term 10 then accept

set firewall family inet filter To-ntp term 20 from  protocol udp

set firewall family inet filter To-ntp term 20 from  port ntp

set firewall family inet filter To-ntp term 20 then discard

set firewall family inet filter To-ntp term 100 then accept

set interfaces lo0 unit 0 family  inet filter input To-ntp


八、配置上NTP配置,CPU依然正常。

wKiom1eKW_TxXq78AACFHZEbHHw571.jpg-wh_50


3、總結

    

     經過這件事情,讓咱們看到網絡設備在公網的環境裏很是的不安全,每個端口都有可能備被人意


外地發現並利用,幸虧及時發現,但願能對讀者在從此的運維工做中,有所幫助!

相關文章
相關標籤/搜索