Hello,
I'm hoping theres an easy answer for this. We are seeing some low end DDOS attacks around 1-2 gbit/sec. The attack signature is SYN packets with random source IPs with a destination within the network that the CCRs do edge routing for. The CPU level is basically 100% the whole time. We did some internal testing, with a 200 megabit sustained syn flood against a host behind a CCR, but with normal traffic we can easily route that much without seeing 1 or 2% cup usage. Is there anything we can set on these so they don't fall over past 1gb/sec of syn traffic with random source addresses? Details below:
Output from test running at about 400k PPS / 200 megabits per second:
CPU usage: 20%
output of profile:
[admin@MikroTik] > /tool profile
NAME CPU USAGE
snmp all 0%
console all 0%
ssh all 0%
networking all 17.1%
winbox all 0%
mpls all 0.1%
management all 0.1%
routing all 5.5%
idle all 76.6%
profiling all 0%
bridging all 0.1%
unclassified all 0.1%
Output of /ip firewall export:
[admin@MikroTik] > /ip firewall export
# jan/04/2015 18:32:36 by RouterOS 6.24
# software id =
#
/ip firewall connection tracking
set enabled=no
/queue export is empty, IP settings print output:
[admin@MikroTik] /ip settings> print
ip-forward: yes
send-redirects: no
accept-source-route: yes
accept-redirects: no
secure-redirects: no
rp-filter: no
tcp-syncookies: no
max-arp-entries: 8192
arp-timeout: 30s
icmp-rate-limit: 10
icmp-rate-mask: 0x1818
allow-fast-path: yes