Re: [j-nsp] DDOS_PROTOCOL_VIOLATION on DHCP - and it's not configured?

2020-05-06 Thread Michael Hare via juniper-nsp
--- Begin Message --- If you are absolutely certain you are not providing DHCP you could always set the punt rate to 1 and disable logging. Beware, this can be an awfully sharp sword. Ask me how I know! system { ddos-protection { protocols {

Re: [j-nsp] DDOS_PROTOCOL_VIOLATION on DHCP - and it's not configured?

2020-05-05 Thread Alexander Arseniev via juniper-nsp
--- Begin Message --- Hello, 2 possibilities: 1/ Your MX240 loopback filter does not block udp/67 2/ You have DHCP traceoptions configured - it starts jdhcpd process even if there is no other DHCP config: set system processes dhcp-service traceoptions blah-blah Thanks Alex -- Original

Re: [j-nsp] DDOS_PROTOCOL_VIOLATION on DHCP - and it's not configured?

2020-05-05 Thread Saku Ytti
Hey Mike, > May 4 20:47:38 jmx240-fmt2 jddosd[3549]: DDOS_PROTOCOL_VIOLATION_SET: > Warning: Host-bound traffic for protocol/exception DHCPv4:bad-packets > exceeded its allowed bandwidth at fpc 1 for 417 times, started at > 2020-05-04 20:47:37 PDT > I almost want to say that, despite

[j-nsp] DDOS_PROTOCOL_VIOLATION on DHCP - and it's not configured?

2020-05-05 Thread Mike
Hello,     On my MX240, I occasionally get log messages of this type: May  4 20:47:38  jmx240-fmt2 jddosd[3549]: DDOS_PROTOCOL_VIOLATION_SET: Warning: Host-bound traffic for protocol/exception  DHCPv4:bad-packets exceeded its allowed bandwidth at fpc 1 for 417 times, started at 2020-05-04