<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic About S/N/K-Series HostDos and Checkspoof commands in FAQs</title>
    <link>https://community.extremenetworks.com/t5/faqs/about-s-n-k-series-hostdos-and-checkspoof-commands/m-p/49964#M634</link>
    <description>Article ID: 14035 &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Products&lt;/B&gt;&lt;BR /&gt;
S-Series, all firmware&lt;BR /&gt;
Matrix N-Series DFE, firmware 7.11.01.0025 and higher&lt;BR /&gt;
K-Series, all firmware &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Discussion&lt;/B&gt;&lt;BR /&gt;
Prior to release 7.x (applies to N-Series), HostDos was a term used to encompass multifaceted protection of the system's host IP stack, along with check spoof protection for transit frames being routed through the system (&lt;A href="http://bit.ly/1jgnryL" target="_blank" rel="nofollow noreferrer noopener"&gt;5417&lt;/A&gt;). &lt;BR /&gt;
&lt;BR /&gt;
As of release 7.x (applies to S/N/K-Series), HostDos applies only to multifaceted protection of the host IP stack, while the 'ip checkspoof strict-mode' and 'ip checkspoof loose-mode' commands have been added to provide check spoof protection for transit frames being routed through the system. &lt;BR /&gt;
&lt;BR /&gt;
N-Series firmware 7.11.01.0025 release notes state:HOSTDOS&lt;BR /&gt;
Use of checkspoof was limited in ECMP topologies. Checkspoof required&lt;BR /&gt;
the interface a packet was received on to also be an interface in a&lt;BR /&gt;
route to the source of the packet. With ECMP topologies, a packet&lt;BR /&gt;
destined for a router interface on a stub network could arrive from a&lt;BR /&gt;
neighbor router also on the stub network because ECMP on neighboring&lt;BR /&gt;
routers directed the packet in that direction. This would cause a&lt;BR /&gt;
checkspoof error. We have now implemented 'ip checkspoof loose-mode'&lt;BR /&gt;
that weakens the restriction to only requiring a route to source of the&lt;BR /&gt;
packet ignoring the interface the packet arrived on. The option 'ip&lt;BR /&gt;
checkspoof strict-mode' provides the legacy feature.&lt;BR /&gt;
During a N-Series 6.x to 7.x firmware upgrade (&lt;A href="http://bit.ly/I8nlKR" target="_blank" rel="nofollow noreferrer noopener"&gt;13533&lt;/A&gt;), in order to maintain the same functionality...&lt;UL&gt; 
&lt;LI&gt;if the command 'hostdos checkspoof' is used at the router level; then upon upgrade to 7.x the original command will have been moved to the non-loopback interface level as 'ip checkspoof strict-mode' (to protect the interface). 
&lt;/LI&gt;&lt;LI&gt;if the command 'hostdos checkspoof' is used at the interface level; then upon upgrade to 7.x the original command will have been changed to 'ip checkspoof strict-mode' (to protect the interface). 
&lt;/LI&gt;&lt;LI&gt;if the command 'hostdos land' is used at the router and/or interface level; then upon upgrade to 7.x the original command will have been moved to the switch level as 'hostdos land' (to protect the host) - with a maximum of one such resulting switch command. 
&lt;/LI&gt;&lt;LI&gt;if the command 'hostdos fragmicmp' is used at the router and/or interface level; then upon upgrade to 7.x the original command will have been moved to the switch level as 'hostdos icmpfrag' (to protect the host) - with a maximum of one such resulting switch command. 
&lt;/LI&gt;&lt;LI&gt;if the command 'hostdos largeicmp' is used at the router and/or interface level; then upon upgrade to 7.x the original command will have been moved to the switch level and 'hostdos icmpsize' (to protect the host) - with a maximum of one such resulting switch command. 
&lt;/LI&gt;&lt;LI&gt;if the command 'hostdos portscan' is used at the router and/or interface level; then upon upgrade to 7.x the original command will have been moved to the switch level as 'hostdos portscan' (to protect the host) - with a maximum of one such resulting switch command.&lt;/LI&gt;&lt;/UL&gt;
Note that the use of 6.x router 'hostdos checkspoof', or 6.x interface 'hostdos checkspoof', or 7.x interface 'ip checkspoof strict-mode' can be incompatible with VRRP on the same system. &lt;BR /&gt;
&lt;BR /&gt;
The 7.x CLI Reference Guide states, for 'ip checkspoof' command usage:Network configurations that utilize VRRP may have connectivity issues to&lt;BR /&gt;
the backup interfaces when using checkspoof strict-mode. Under this&lt;BR /&gt;
circumstance, traffic may be routed via what appears to be the non-best&lt;BR /&gt;
path to the backup interface, due to the inherent nonsymmetric nature of&lt;BR /&gt;
VRRP routing. Strict-mode checkspoof rejects frames that do not ingress&lt;BR /&gt;
the "best" interface. When utilizing VRRP, use the loose-mode version of&lt;BR /&gt;
checkspoof. This mode verifies that the source IP in the packet is at&lt;BR /&gt;
least in a "known" network.</description>
    <pubDate>Tue, 03 Dec 2013 19:48:00 GMT</pubDate>
    <dc:creator>FAQ_User</dc:creator>
    <dc:date>2013-12-03T19:48:00Z</dc:date>
    <item>
      <title>About S/N/K-Series HostDos and Checkspoof commands</title>
      <link>https://community.extremenetworks.com/t5/faqs/about-s-n-k-series-hostdos-and-checkspoof-commands/m-p/49964#M634</link>
      <description>Article ID: 14035 &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Products&lt;/B&gt;&lt;BR /&gt;
S-Series, all firmware&lt;BR /&gt;
Matrix N-Series DFE, firmware 7.11.01.0025 and higher&lt;BR /&gt;
K-Series, all firmware &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Discussion&lt;/B&gt;&lt;BR /&gt;
Prior to release 7.x (applies to N-Series), HostDos was a term used to encompass multifaceted protection of the system's host IP stack, along with check spoof protection for transit frames being routed through the system (&lt;A href="http://bit.ly/1jgnryL" target="_blank" rel="nofollow noreferrer noopener"&gt;5417&lt;/A&gt;). &lt;BR /&gt;
&lt;BR /&gt;
As of release 7.x (applies to S/N/K-Series), HostDos applies only to multifaceted protection of the host IP stack, while the 'ip checkspoof strict-mode' and 'ip checkspoof loose-mode' commands have been added to provide check spoof protection for transit frames being routed through the system. &lt;BR /&gt;
&lt;BR /&gt;
N-Series firmware 7.11.01.0025 release notes state:HOSTDOS&lt;BR /&gt;
Use of checkspoof was limited in ECMP topologies. Checkspoof required&lt;BR /&gt;
the interface a packet was received on to also be an interface in a&lt;BR /&gt;
route to the source of the packet. With ECMP topologies, a packet&lt;BR /&gt;
destined for a router interface on a stub network could arrive from a&lt;BR /&gt;
neighbor router also on the stub network because ECMP on neighboring&lt;BR /&gt;
routers directed the packet in that direction. This would cause a&lt;BR /&gt;
checkspoof error. We have now implemented 'ip checkspoof loose-mode'&lt;BR /&gt;
that weakens the restriction to only requiring a route to source of the&lt;BR /&gt;
packet ignoring the interface the packet arrived on. The option 'ip&lt;BR /&gt;
checkspoof strict-mode' provides the legacy feature.&lt;BR /&gt;
During a N-Series 6.x to 7.x firmware upgrade (&lt;A href="http://bit.ly/I8nlKR" target="_blank" rel="nofollow noreferrer noopener"&gt;13533&lt;/A&gt;), in order to maintain the same functionality...&lt;UL&gt; 
&lt;LI&gt;if the command 'hostdos checkspoof' is used at the router level; then upon upgrade to 7.x the original command will have been moved to the non-loopback interface level as 'ip checkspoof strict-mode' (to protect the interface). 
&lt;/LI&gt;&lt;LI&gt;if the command 'hostdos checkspoof' is used at the interface level; then upon upgrade to 7.x the original command will have been changed to 'ip checkspoof strict-mode' (to protect the interface). 
&lt;/LI&gt;&lt;LI&gt;if the command 'hostdos land' is used at the router and/or interface level; then upon upgrade to 7.x the original command will have been moved to the switch level as 'hostdos land' (to protect the host) - with a maximum of one such resulting switch command. 
&lt;/LI&gt;&lt;LI&gt;if the command 'hostdos fragmicmp' is used at the router and/or interface level; then upon upgrade to 7.x the original command will have been moved to the switch level as 'hostdos icmpfrag' (to protect the host) - with a maximum of one such resulting switch command. 
&lt;/LI&gt;&lt;LI&gt;if the command 'hostdos largeicmp' is used at the router and/or interface level; then upon upgrade to 7.x the original command will have been moved to the switch level and 'hostdos icmpsize' (to protect the host) - with a maximum of one such resulting switch command. 
&lt;/LI&gt;&lt;LI&gt;if the command 'hostdos portscan' is used at the router and/or interface level; then upon upgrade to 7.x the original command will have been moved to the switch level as 'hostdos portscan' (to protect the host) - with a maximum of one such resulting switch command.&lt;/LI&gt;&lt;/UL&gt;
Note that the use of 6.x router 'hostdos checkspoof', or 6.x interface 'hostdos checkspoof', or 7.x interface 'ip checkspoof strict-mode' can be incompatible with VRRP on the same system. &lt;BR /&gt;
&lt;BR /&gt;
The 7.x CLI Reference Guide states, for 'ip checkspoof' command usage:Network configurations that utilize VRRP may have connectivity issues to&lt;BR /&gt;
the backup interfaces when using checkspoof strict-mode. Under this&lt;BR /&gt;
circumstance, traffic may be routed via what appears to be the non-best&lt;BR /&gt;
path to the backup interface, due to the inherent nonsymmetric nature of&lt;BR /&gt;
VRRP routing. Strict-mode checkspoof rejects frames that do not ingress&lt;BR /&gt;
the "best" interface. When utilizing VRRP, use the loose-mode version of&lt;BR /&gt;
checkspoof. This mode verifies that the source IP in the packet is at&lt;BR /&gt;
least in a "known" network.</description>
      <pubDate>Tue, 03 Dec 2013 19:48:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/faqs/about-s-n-k-series-hostdos-and-checkspoof-commands/m-p/49964#M634</guid>
      <dc:creator>FAQ_User</dc:creator>
      <dc:date>2013-12-03T19:48:00Z</dc:date>
    </item>
  </channel>
</rss>

