User Security Configuration Guide, Cisco IOS Release 15MT
Bias-Free Language
The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
The IP Source Tracker feature tracks information in the following ways:
Gathers information about the traffic that is flowing to a host that is suspected of being under attack.
Generates all the necessary information in an easy-to-use format to track the network entry point of a DoS attack.
Tracks Multiple IPs at the same time.
Tracks DoS attacks across the entire network.
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest caveats and feature information,
see Bug Search Tool and the release notes for your platform and software release. To find information about the features documented in this module,
and to see a list of the releases in which each feature is supported, see the feature information table.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature
Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
Restrictions for IP Source Tracker
Packets Can Be Dropped for Routers
IP source tracking is designed to track attacks against hosts. Packets can be dropped if the line card or port adapter CPU
is overwhelmed. Therefore, when used to track an attack against a router, IP source tracking can drop control packets, such
as Border Gateway Protocol (BGP) updates.
Engine 0 and 1 Performances Affected on Cisco 12000 Series
There is no performance impact for packets destined to nontracked IP addresses on Engine 2 and Engine 4 line cards because
the IP source tracker affects only tracked destinations. Engine 0 and Engine 1 performances are affected because on these
engines all packets are switched by the CPU.
Note
On Cisco 7500 series routers, there is no performance impact on destinations that are not tracked.
Information About IP Source Tracker
Identifying and Tracking Denial of Service Attacks
One of the many challenges faced by customers today is the tracking and blocking denial-of-service (DoS) attacks. Counteracting
a DoS attack involves intrusion detection, source tracking, and blocking. This functionality addresses the need for source
tracking.
To trace attacks, NetFlow and access control lists (ACLs) have been used. To block attacks, committed access rate (CAR) and
ACLs have been used. Support for these features on the Cisco 12000 series Internet router has depended on the type of line
card used. Support for these features on the Cisco 7500 series routers depends upon the type of port adapter used. There is,
therefore, a need to develop a way to receive information that both traces the source of an attack and is supported on all
line cards and port adapters.
Normally, when you identify the host that is subject to a DoS attack, you must determine the network ingress point to effectively
block the attack. This process starts at the router closest to the host.
For example, in the figure below, you would start at Router A and try to determine the next upstream router to examine. Traditionally,
you would apply an output ACL to the interface connecting to the host to log packets that match the ACL. The logging information
is dumped to the router console or system log. You then have to analyze this information, and possibly go through several
ACLs in succession to identify the input interface for the attack. In this case the information points back to Router B.
You then repeat this process on Router B, which leads back to Router C, an ingress point into the network. At this point
you can use ACLs or CAR to block the attack. This procedure can require applying several ACLs that generate an excessive amount
of output to analyze, making this procedure cumbersome and error prone.
Using IP Source Tracker
IP source tracker provides an easier, more scalable alternative to output ACLs for tracking DoS attacks, and it works as follows:
After you identify the destination being attacked, enable tracking for the destination address on the whole router by entering
the ipsource-track command.
Each line card creates a special Cisco Express Forwarding (CEF) entry for the destination address being tracked. For line
cards or port adapters that use specialized
Application-Specific Integrated Circuit (ASICs)
for packet switching, the CEF entry is used to punt packets to the line card’s or port adapter’s CPU.
Each line card CPU collects information about the traffic flow to the tracked destination.
The data generated is periodically exported to the router. To display a summary of the flow information, enter the showipsource-tracksummary command. To display more detailed information for each input interface, enter the showipsource-track command.
Statistics provide a breakdown of the traffic to each tracked IP address. This breakdown allows you to determine which upstream
router to analyze next. You can shut down the IP source tracker on the current router by entering the noipsource-track command, and reopen it on the upstream router.
Repeat Step 1 to Step 5 until you identify the source of the attack.
Apply CAR or ACLs to limit or stop the attack.
IP Source Tracker Hardware Support
IP source tracking is supported on all Engine 0, 1, 2, and 4 line cards in the Cisco 12000 series Internet router. It is also
supported on all port adapters and RSPs that have CEF switching enabled on Cisco 7500 series routers.
How to Configure IP Source Tracker
Configuring IP Source Tracking
To configure IP source tracking for a host under attack, perform the following steps.
SUMMARY STEPS
enable
configureterminal
ipsource-trackip-address
ipsource-trackaddress-limitnumber
ipsource-tracksyslog-intervalnumber
ipsource-trackexport-intervalnumber
DETAILED STEPS
Command or Action
Purpose
Step 1
enable
Example:
Router> enable
Enables privileged EXEC mode.
Enter your password if prompted.
Step 2
configureterminal
Example:
Router# configure terminal
Enters global configuration mode.
Step 3
ipsource-trackip-address
Example:
Router(config)# ip source-track 100.10.0.1
Enables IP source tracking for a specified host.
Step 4
ipsource-trackaddress-limitnumber
Example:
Router(config)# ip source-track address-limit 10
(Optional) Limits the number of hosts that can be simultaneously tracked at any given time.
Note
If this command is not enabled, there is no limit to the number of hosts that be can tracked.
Step 5
ipsource-tracksyslog-intervalnumber
Example:
Router(config)# ip source-track syslog-interval 2
(Optional) Sets the time interval, in minutes, used to generate syslog messages that indicate IP source tracking is enabled.
Note
If this command is not enabled, system log messages are not generated.
Step 6
ipsource-trackexport-intervalnumber
Example:
Router(config)# ip source-track export-interval 30
(Optional) Sets the time interval, in seconds, used to export IP tracking statistics that are collected in the line cards
to the gigabit route processor (GRP) and the port adapters to the route switch processor (RSP).
Note
If this command is not enabled, traffic flow information is exported to the GRP and RSP every 30 seconds.
What to Do Next
After you have configured source tracking on your network device, you can verify your configuration and source tracking statistics,
such as traffic flow. To complete this task, see the following section “Verifying IP Source Tracking.”
Verifying IP Source Tracking
To verify the status of source tracking, such as packet processing and traffic flow information, perform the following steps.
SUMMARY STEPS
enable
showipsource-track [ip-address] [summary |
cache
showipsource-trackexportflows
DETAILED STEPS
Command or Action
Purpose
Step 1
enable
Example:
Router> enable
Enables privileged EXEC mode.
Enter your password if prompted.
Step 2
showipsource-track [ip-address] [summary |
cache
Example:
Router# show ip source-track summary
Displays traffic flow statistics for tracked IP host addresses
Step 3
showipsource-trackexportflows
Example:
Router# show ip source-track export flows
Displays the last 10 packet flows that were exported from the line card to the route processor.
Note
This command can be issued only on distributed platforms, such as the GRP and the RSP.
Example
The following example, which is sample output from the
showipsource-tracksummary command, shows how to verify that IP source tracking is enabled for one or more hosts:
The following example, which is sample output from the
showipsource-tracksummary command, shows how to verify that no traffic has yet to be received for the destination hosts that are being tracked:
The following example, which is sample output from the
showipsource-trackcommand, shows how to verify that IP source tracking is processing packets to the hosts and exporting statistics from the
line card or port adapter to the GRP and RSP:
The following example shows how to configure IP source tracking on all line cards and port adapters in the router. In this
example, each line card or port adapter collects traffic flow data to host address 100.10.0.1 for 2 minutes before creating
an internal system log entry; packet and flow information recorded in the system log is exported for viewing to the route
processor or switch processor every 60 seconds.
Router# configure interface
Router(config)# ip source-track 100.10.0.1
Router(config)# ip source-track syslog-interval 2
Router(config)# ip source-track export-interval 60
Verifying Source Interface Statistics for All Tracked IP Addresses Example
The following example displays a summary of the traffic flow statistics that are collected on each source interface for tracked
host addresses.
Verifying a Flow Statistic Summary for All Tracked IP Addresses Example
The following example displays a summary of traffic flow statistics for all hosts that are being tracked; it shows that no
traffic has yet been received.
The Cisco Support website provides extensive online resources, including documentation and tools for troubleshooting and
resolving technical issues with Cisco products and technologies.
To receive security and technical information about your products, you can subscribe to various services, such as the Product
Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.
Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.
The following table provides release information about the feature or features described in this module. This table lists
only the software release that introduced support for a given feature in a given software release train. Unless noted otherwise,
subsequent releases of that software release train also support that feature.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco
Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
Table 1. Feature Information for IP Source Tracker
Feature Name
Releases
Feature Information
IP Source Tracker
12.0(21)S 12.0(22)S 12.0(26)S 12.3(7)T 12.2(25)S
The IP Source Tracker feature allows information to be gathered about the traffic that is flowing to a host that is suspected
of being under attack.
This feature was introduced in Release 12.0(21)S on the Cisco 12000 series.
This feature was implemented in Release 12.0(22)S on the Cisco 7500 series.
This feature was implemented in Release 12.0(26)S on the Cisco 12000 series IP Service Engine (ISE) line cards.
This feature was integrated into Cisco IOS Release 12.3(7)T.
This feature was integrated into Cisco IOS Release 12.2(25)S.
The following commands were introduced or modified:
ipsource-track,ipsource-trackaddress-limit,ipsource-trackexport-interval,ipsource-tracksyslog-interval,showipsource-track,showipsource-trackexportflows.