Skip to content

Instantly share code, notes, and snippets.

@rlodev67
Forked from githubfoam/huawei switch cheat sheet
Created September 6, 2024 12:27
Show Gist options
  • Save rlodev67/0266e954d7041208fd21dd33941b901f to your computer and use it in GitHub Desktop.
Save rlodev67/0266e954d7041208fd21dd33941b901f to your computer and use it in GitHub Desktop.
huawei switch cheat sheet
------------------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------------------------
#Enter the system view mode
<Quidway>sys
Enter system view, return user view with Ctrl+Z.
------------------------------------------------------------------------------------------------------------------------------
#Enter the system view mode
<HUAWEI>system-view
Enter system view, return user view with Ctrl+Z
------------------------------------------------------------------------------------------------------------------------------
<HUAWEI>display version
<HUAWEI> display current-configuration
<HUAWEI> display current-configuration | include sysname #view switch name
<HUAWEI> display current-configuration | include vlan
<HUAWEI>display current-configuration include interface GigabitEthernet0/0/1 #display only the configuration related to the GigabitEthernet0/0/1 interface.
------------------------------------------------------------------------------------------------------------------------------
<HUAWEI> display ip interface brief # switch IP address
<HUAWEI> display interface brief | exclude Ethernet|NULL|Tunnel
[HUAWEI]display interface brief | include XGigabitEthernet
[HUAWEI]display interface | include XGigabitEthernet
------------------------------------------------------------------------------------------------------------------------------
#log troubleshooting ChatGPT
Enter Privileged Mode:
Login with appropriate credentials and enter privileged mode (if required) using the following command:
<Switch> system-view
<Switch> // Enter privileged mode
Configure Log Settings:
Set the log level and configure the log buffer size to ensure SNMP-related logs are captured. For example:
[Switch] info-center source default channel 2 log level informational
[Switch] info-center logbuffer size 1024 // Adjust the buffer size as needed
4. View Logs:
To view logs, use the following command to display system logs:
[Switch] display logbuffer // View logs in the buffer
Stop Viewing Logs:
To stop viewing logs in real-time (i.e., to exit from the continuous log display), press Ctrl + C on the keyboard. This key combination interrupts the log display and returns you to the command prompt.
------------------------------------------------------------------------------------------------------------------------------
#log troubleshooting Bard
The method for starting and stopping viewing logs on a Huawei backbone switch depends on the specific switch model and software version. However, the general approach is similar across different models.
Starting Log Viewing:
Access the switch console or CLI: Connect to the switch console using a terminal emulator or access the switch CLI remotely through SSH or Telnet.
Enter privilege mode: If you're not already in privilege mode, enter the privilege mode by typing enable and providing the enable password when prompted.
Enter system view mode: Enter system view mode by typing system-view.
Enter the log view mode: Enter log view mode by typing display logbuffer.
Specify the log type: Optionally, you can specify the type of log to view by typing display logbuffer type logtype, where logtype is the specific log type, such as alarms, traffic, or security.
Stopping Log Viewing:
Exit log view mode: To stop viewing logs, simply exit log view mode by typing quit.
Exit system view mode: Exit system view mode by typing quit.
Exit privilege mode (optional): If you want to exit privilege mode, type exit.
Here's an example of how to start viewing logs on a Huawei backbone switch:
user@switch# enable
Enter enable password:
<enable password>
user@switch(config)# system-view
[System-view]
[System-view]display logbuffer
Here's an example of how to stop viewing logs on a Huawei backbone switch:
[System-view]display logbuffer
[System-view]quit
[System-view]quit
Remember to replace <enable password> with your actual enable password.
------------------------------------------------------------------------------------------------------------------------------
display users #check all the users who have logged in to the device. The line marked with a plus sign (+) indicates the current user.
display user-interface #check the permissions of all users.
------------------------------------------------------------------------------------------------------------------------------
#ChatGPT
To find out the connected devices to a Huawei network switch via CLI, you can use the following commands:
Check the MAC address table: Use the command "display mac-address" to view the MAC address table of the switch.
This will show you all of the MAC addresses that the switch has learned and the interfaces they are associated with.
You can then use a MAC address lookup tool to identify the manufacturer and potentially the device type.
Check the ARP table: Use the command "display arp" to view the ARP table of the switch.
This will show you the IP addresses and MAC addresses of devices that have communicated with the switch recently.
You can then use a MAC address lookup tool to identify the manufacturer and potentially the device type.
Check the interface status: Use the command "display interface brief" to view the status of all interfaces on the switch.
This will show you which interfaces are up and which are down, as well as the speed and duplex settings.
You can use this information to identify connected devices by checking the corresponding ports on the switch.
Check the LLDP neighbors: Use the command "display lldp neighbor" to view the LLDP neighbors of the switch.
This will show you information about neighboring devices that support the LLDP protocol, including their device type, port,
and hostname.
In summary, to find out the connected devices to a Huawei network switch via CLI,
you can use commands such as "display mac-address", "display arp", "display interface brief", and "display lldp neighbor".
These commands will provide you with information about the MAC addresses, IP addresses, interfaces, and neighboring devices
connected to the switch.
------------------------------------------------------------------------------------------------------------------------------
#ChatGPT
Enter the system view mode by typing the following command:
system-view
For example, if the MAC address you're searching for is "0011-2233-4455", use the following command:
display mac-address 0011-2233-4455
For example, to search for MAC addresses on interface GigabitEthernet 0/1/1,
display mac-address GigabitEthernet 0/1/1
You can also search for MAC addresses associated with a specific VLAN.
display mac-address vlan 10
display mac-address vlan 4 GigabitEthernet 0/1/1
------------------------------------------------------------------------------------------------------------------------------
display lldp statistics
display lldp local
#view the LLDP neighbors of the switch. This will show you information about neighboring devices that support the LLDP protocol,
#including their device type, port, and hostname.
display lldp neighbor
display lldp neighbor brief
display lldp neighbor interface XGigabitEthernet 2/2/4
------------------------------------------------------------------------------------------------------------------------------
#ChatGPT
In the output of "display lldp neighbor brief" command on a Huawei network switch, "XGE2/0/6" and "GE3/0/8" are both interface names that represent different ports on the switch.
The main difference between these two interface names is that "XGE2/0/6" refers to a 10 Gigabit Ethernet (10GE) port, while "GE3/0/8" refers to a Gigabit Ethernet (GE) port.
The "X" in "XGE" stands for 10, which denotes the port's speed of 10 Gigabits per second (Gbps). On the other hand, the absence of the "X" in "GE" indicates that the port's speed is 1 Gigabit per second.
Therefore, "XGE2/0/6" is a 10GE port on slot 2, subcard 0, and port 6, while "GE3/0/8" is a GE port on slot 3, subcard 0, and port 8.
------------------------------------------------------------------------------------------------------------------------------
<HUAWEI> system-view #The system-view command enables you to enter the system view from the user view.
[HUAWEI] display lldp local interface Gigabitethernet 0/0/1
Error: The LLDP is not enabled on this port.
<HUAWEI> system-view
[HUAWEI] lldp enable
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[Quidway-GigabitEthernet1/0/1] lldp enable
Info: The LLDP is enabled on the port successfully.
------------------------------------------------------------------------------------------------------------------------------
#Enable SSH Huawei Quidway
#Create RSA Local Public Key Pair
<Quidway> system-view
Enter system view, return user view with Ctrl+Z.
[Quidway]rsa local-key-pair create
The key name will be: Quidway_Host
The range of public key size is (512 ~ 2048).
NOTES: If the key modulus is greater than 512,
It will take a few minutes.
Input the bits in the modulus[default = 512]:1024
Generating keys...
......................................++++++
.....++++++
..++++++++
.........++++++++
[Quidway]
#Create Username and Password for SSH
[Quidway]aaa
[Quidway-aaa]local-user root password cipher YourPassword
[Quidway-aaa]local-user root level 15
[Quidway-aaa]local-user root service-type ssh
[Quidway-aaa]quit
[Quidway]
[Quidway]display current-configuration configuration aaa
#Configure SSH Server
[Quidway]stelnet server enable
Info:Start STELNET server
[Quidway]ssh user root authentication-type password
Info:A new ssh user added
[Quidway]ssh user root service-type stelnet
[Quidway]
#Configure Virtual User Terminal
[Quidway]user-interface vty 0 4
[Quidway-ui-vty0-4]authentication-mode aaa
[Quidway-ui-vty0-4]protocol inbound ssh
------------------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------------------------
>display vlan # list all VLANs
[Huawei]display vlan 10
[Huawei]display vlan 10 to 20
>display interface vlan 4
#create VLAN
<Huawei>system-view
[Huawei]vlan 10
[Huawei-vlan10]description ITDP
#create multiple VLANs
[Huawei]vlan batch 5 8 17
#create VLANs within a range
[Huawei]vlan batch 20 to 30
[Huawei]vlan batch 35 36 45 to 50 52 61 70 to 80
#delete VLAN
[Huawei]undo vlan 5
#Assign port to a VLAN
<Huawei>system-view
[Huawei]sysname SW1
[SW1]vlan batch 10 20
[SW1]interface GigabitEthernet 0/0/2
[SW1-GigabitEthernet0/0/2]port link-type access
[SW1-GigabitEthernet0/0/2]port default vlan 10
[SW1-GigabitEthernet0/0/2]display this
[SW1]interface GigabitEthernet 0/0/3
[SW1-GigabitEthernet0/0/3]port link-type access
[SW1-GigabitEthernet0/0/3]port default vlan 20
#Assign port to a trunk
[SW1]interface GigabitEthernet 0/0/1
[SW1-GigabitEthernet0/0/1]port link-type trunk
[SW1-GigabitEthernet0/0/1]port trunk allow-pass vlan 10 20
[SW1-GigabitEthernet0/0/1]port trunk allow-pass vlan all # allow all trunks to pass
------------------------------------------------------------------------------------------------------------------------------
>display arp interface vlan 4
>display interface brief
>display ip interface description
------------------------------------------------------------------------------------------------------------------------------
# set local admin password
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] local-user admin password cipher huawei@123
[HUAWEI-aaa] local-user admin password simple huawei@123
------------------------------------------------------------------------------------------------------------------------------
>display history-command
#display the IP addresses associated with the VLAN
display ip interface brief vlan {vlan_id}
display vlan 2 verbose
------------------------------------------------------------------------------------------------------------------------------
#ChatGPT
Here are some Kali Linux tools that can be used to scan Huawei
network switches:
Nmap: Nmap is a versatile network scanning tool that can be used to discover hosts and services on a network. It supports various scanning techniques, including port scanning and OS detection, which can be useful for scanning Huawei switches.
SNMPWalk: SNMPWalk is a command-line tool that utilizes Simple Network Management Protocol (SNMP) to retrieve information from network devices. It can be used to gather data from Huawei switches, such as interface statistics, VLAN information, and system details.
SNMPCheck: SNMPCheck is an SNMP-based tool that can be used to assess the security of SNMP implementations. It can be helpful in identifying vulnerabilities and misconfigurations in Huawei switches' SNMP settings.
Yersinia: Yersinia is a network tool designed specifically for performing Layer 2 attacks. It can be used to test the security of Huawei switches by exploiting common Layer 2 vulnerabilities, such as VLAN hopping and Spanning Tree Protocol (STP) manipulation.
Wireshark: Wireshark is a widely-used network protocol analyzer that can capture and analyze network traffic. It can be used to inspect the traffic passing through Huawei switches, allowing you to identify potential security issues or abnormal behavior.
Metasploit Framework: Metasploit Framework is a powerful penetration testing tool that includes a vast range of exploits, payloads, and auxiliary modules. It can be used to test the security of Huawei switches by attempting to exploit known vulnerabilities.
Huawei eSight: Huawei eSight is a centralized network management software provided by Huawei. It offers comprehensive monitoring, management, and analysis capabilities for Huawei switches. It allows you to monitor device health, performance, and security, as well as generate reports and alerts.
Please note that while these tools can be used for legitimate network scanning and security testing purposes, it is crucial to obtain proper authorization before scanning or testing any network devices to avoid any legal or ethical issues. Additionally, the availability and compatibility of these tools may vary, so ensure you refer to the documentation and support resources for each specific tool to ensure it aligns with your requirements.
------------------------------------------------------------------------------------------------------------------------------
#Bard
Sure. Here are some of the Kali tools that can be used to scan Huawei network switches:
Huawei Switch Discovery Tool: This tool can be used to discover Huawei network switches on a network. It can also be used to gather information about the switches, such as their IP addresses, MAC addresses, and firmware versions.
Nmap: Nmap is a well-known network scanner that can be used to scan for Huawei network switches and identify their open ports and services.
Nessus: Nessus is a commercial vulnerability scanner that can be used to scan Huawei network switches for known vulnerabilities.
Metasploit: Metasploit is a framework that can be used to exploit vulnerabilities in Huawei network switches.
These are just a few of the many Kali tools that can be used to scan Huawei network switches. The best tool for a particular task will depend on the specific needs of the user.
Here are some additional details about each of the tools listed above:
Huawei Switch Discovery Tool: The Huawei Switch Discovery Tool is a free and open-source tool that can be used to discover Huawei network switches on a network. It can also be used to gather information about the switches, such as their IP addresses, MAC addresses, and firmware versions. The Huawei Switch Discovery Tool can be downloaded from the Huawei website.
Nmap: Nmap is a free and open-source network scanner that can be used to scan for Huawei network switches and identify their open ports and services. Nmap is a powerful tool that can be used to quickly and easily identify Huawei switches on a network. It can also be used to identify the open ports and services on Huawei switches. This information can be used to assess the security of Huawei switches and to identify potential vulnerabilities. Nmap can be downloaded from the Nmap website.
Nessus: Nessus is a commercial vulnerability scanner that can be used to scan Huawei network switches for known vulnerabilities. Nessus is a powerful tool that can be used to identify known vulnerabilities in Huawei switches. This information can be used to assess the security of Huawei switches and to prioritize remediation efforts. Nessus can be purchased from the Tenable website.
Metasploit: Metasploit is a framework that can be used to exploit vulnerabilities in Huawei network switches. Metasploit is a powerful tool that can be used to exploit known vulnerabilities in Huawei switches. This information can be used to gain unauthorized access to Huawei switches. Metasploit can be downloaded from the Metasploit website.
It is important to note that using these tools to scan Huawei network switches can be a security risk. If you are not familiar with how to use these tools, it is best to consult with a security expert before using them.
------------------------------------------------------------------------------------------------------------------------------
#Bard
you started running huawei backbone switch instead of cisco backbone switch. Cisco edge switches lost some of their VLAN configurations. when you create vlan configuration on cisco edge switch the colour of port connection on device turns from orange to yellow. explain why
The port color change from orange to yellow when you create a VLAN configuration on a Cisco edge switch after migrating to a Huawei backbone switch is likely due to a mismatch in the VLAN trunking protocol (VTP) configuration between the two types of switches.
Cisco and Huawei switches use different VTP versions and implementations. By default, Cisco switches use VTP version 2, while Huawei switches use VTP version 3. If the VTP configuration is not compatible between the two types of switches, it can cause problems with VLAN trunking and can also cause the port color to change to yellow.
To fix the problem, you need to make sure that the VTP configuration is compatible between the Cisco edge switches and the Huawei backbone switch. You can do this by either changing the VTP version on the Cisco edge switches to VTP version 3, or by changing the VTP mode on the Huawei backbone switch to VTP transparent mode.
Here are some tips for configuring VTP between Cisco and Huawei switches:
If you are using VTP version 2, make sure that the VTP domain name and VTP password are the same on all of the switches.
If you are using VTP version 3, make sure that the VTP mode is set to server on the Huawei backbone switch and to client on the Cisco edge switches.
If you are using VTP transparent mode on the Huawei backbone switch, make sure that the VTP domain name and VTP password are the same on all of the switches.
Once you have configured VTP correctly, the port color should change back to green.
Here are some additional reasons why the port color might change to yellow:
The port is not configured as a trunk port.
The port is not connected to a trunk port on another switch.
There is a problem with the cable connecting the port to another switch.
There is a problem with the trunk port on another switch.
If you have configured VTP correctly and the port color is still yellow, you can try the following:
Check the port configuration to make sure that it is configured as a trunk port.
Make sure that the port is connected to a trunk port on another switch.
Try replacing the cable connecting the port to another switch.
Try connecting the port to a different trunk port on another switch.
If you have tried all of the above and the port color is still yellow, you may need to contact your vendor for support.
------------------------------------------------------------------------------------------------------------------------------
#Bard
you started running huawei backbone switch instead of cisco backbone switch. Cisco edge switches lost some of their VLAN configurations. when you create vlan configuration on cisco edge switch the colour of port connection on device turns from orange to yellow. when you configure vtp transparent mode on cisco edge switches but not on huawei backbone switch. the problem looks resolved.explain why
When you configure VTP transparent mode on the Cisco edge switches, you are disabling VTP on the Cisco edge switches. This means that the Cisco edge switches will no longer try to synchronize their VLAN configurations with the Huawei backbone switch.
This is likely the reason why the problem looks resolved. When VTP is enabled on the Cisco edge switches, they will try to synchronize their VLAN configurations with the Huawei backbone switch. However, the Huawei backbone switch uses a different VTP version and implementation than the Cisco edge switches. This can cause problems with VLAN trunking and can also cause the port color to change to yellow.
When you configure VTP transparent mode on the Cisco edge switches, they will no longer try to synchronize their VLAN configurations with the Huawei backbone switch. This will prevent the problems with VLAN trunking and will also cause the port color to change back to green.
Here are some additional benefits of using VTP transparent mode:
VTP transparent mode can help to improve the security of your network by preventing unauthorized changes to VLAN configurations.
VTP transparent mode can also help to improve the performance of your network by reducing the amount of traffic that is generated by VTP.
Overall, VTP transparent mode is a good option to use when you have a network that consists of switches from different vendors.
------------------------------------------------------------------------------------------------------------------------------
#ChatGPT
you started running huawei backbone switch instead of cisco backbone switch. Cisco edge switches lost some of their VLAN configurations. when you create vlan configuration on cisco edge switch the colour of port connection on device turns from orange to yellow. when you configure vtp transparent mode on cisco edge switches but not on huawei backbone switch. the problem looks resolved.explain why
When you introduce a Huawei backbone switch into an existing network where Cisco switches were originally configured, issues with VLAN configurations and port status color changes can occur. By configuring VTP (VLAN Trunking Protocol) transparent mode on the Cisco edge switches and not on the Huawei backbone switch, you effectively isolate the VLAN management domains. This configuration can help address the issues and prevent further conflicts. Here's why:
VTP and VLAN Configuration:
Cisco Switches: In the Cisco environment, VTP is a protocol used to manage and distribute VLAN configurations across the network. When a switch is configured as a VTP server or client, it can send and receive updates about VLANs from other switches. This allows for centralized VLAN management.
Huawei Switch: Huawei switches might not use VTP, and their VLAN configurations may not be compatible with Cisco's VTP updates.
VTP Transparent Mode:
Cisco Edge Switches: When configured in VTP transparent mode, Cisco switches do not participate in the VTP domain. They neither send nor receive VTP updates. This mode is typically used when you want to prevent accidental changes from affecting the VLAN configurations on the switch.
Huawei Backbone Switch: The Huawei switch doesn't participate in VTP, and as such, it's unaware of the VTP updates generated by the Cisco switches. It continues to operate based on its own VLAN configurations.
By configuring the Cisco edge switches in VTP transparent mode, you effectively disconnect them from the VTP domain, which means:
They no longer listen to VTP advertisements from other switches, including the Huawei switch.
They don't send VTP advertisements to the network, so they won't interfere with the Huawei switch or other devices that may still be participating in VTP.
This setup can help maintain the stability of the VLAN configurations on both the Huawei and Cisco switches. It prevents potential conflicts that could result from differences in VTP management between the two switch types.
It's important to note that while VTP transparent mode can help avoid VTP-related issues, it also means that you'll need to manage VLAN configurations manually on the Cisco switches. Any changes made on the Huawei switch won't automatically propagate to the Cisco switches. If you need consistent VLAN configurations across the entire network, you may need to revisit the VTP configuration on the Huawei switch or use alternative methods for managing VLANs.
------------------------------------------------------------------------------------------------------------------------------
#ChatGPT
you started running huawei backbone switch instead of cisco backbone switch. You have cisco edge switches running. explain if you need stp protocol configured in this environment.
In a network environment where you've replaced the Cisco backbone switch with a Huawei backbone switch while retaining Cisco edge switches, it's essential to consider the need for the Spanning Tree Protocol (STP). STP plays a crucial role in preventing loops and ensuring network stability. Here are some important factors to consider:
Mixed Vendor Environment:
When you have a mixed vendor environment like this, it's possible that there may be variations in how Cisco and Huawei switches implement the STP protocol. Both vendors are likely to support the IEEE 802.1D STP standard, but there might be proprietary extensions or optimizations that could lead to incompatibilities.
STP Mode:
Cisco switches typically run the Rapid Spanning Tree Protocol (RSTP) or the newer Multiple Spanning Tree Protocol (MSTP) for faster convergence and better load balancing. Huawei switches often support MSTP as well. When you mix different STP modes, it could lead to unexpected behaviors and potential network disruptions.
Bridge Priority:
Cisco and Huawei switches might have different default bridge priorities for STP. A lower bridge priority implies a more preferred root bridge. If not configured properly, it might result in one vendor's switch becoming the root bridge, which could affect the network's intended topology.
Consistency:
To maintain network stability, it's a good practice to ensure STP configurations are consistent across the network. While the Huawei backbone switch may interoperate with the Cisco switches, potential issues could arise due to differences in default settings or unexpected behaviors.
Given these considerations, here's what you should do:
Review and Standardize STP Configurations: If you plan to use STP in the network, standardize the STP configurations across all switches. Ensure that all switches run the same version (RSTP or MSTP), and consider adjusting bridge priorities to align with your desired root bridge.
Test the Network: Before deploying the mixed network in a production environment, conduct thorough testing. This includes testing failover scenarios, checking for any potential inconsistencies or issues, and verifying that the network behaves as expected.
Consider Alternatives: Depending on your network's requirements and complexity, you might also explore alternative redundancy and loop prevention mechanisms, such as Link Aggregation (LACP) or Virtual Router Redundancy Protocol (VRRP).
Vendor Support: Contact the vendors (Cisco and Huawei) for specific guidance and compatibility information related to STP in a mixed vendor environment.
Ultimately, the decision to use STP in this mixed environment should be made cautiously and after thorough testing. Ensuring consistent configurations and potential vendor-specific adjustments will be crucial in maintaining network stability and preventing unexpected issues.
------------------------------------------------------------------------------------------------------------------------------
#Bard
you started running huawei backbone switch instead of cisco backbone switch. You have cisco edge switches running. explain if you need stp protocol configured in this environment.
Yes, you need STP protocol configured in this environment even though you are using a Huawei backbone switch and Cisco edge switches. Spanning Tree Protocol (STP) is used to prevent bridging loops on networks. A bridging loop is a network topology in which two or more switches are connected to each other in a loop. This can cause problems with traffic forwarding and can also cause network outages.
STP works by blocking redundant links in a network topology. This creates a single, active path between any two points on the network. If a link fails, STP will unblock a redundant link to maintain connectivity between the two points.
STP is important to use in any network that has two or more switches. This is because even small networks can be susceptible to bridging loops. For example, if you have two switches connected to each other and one of the switches is connected to a server, a bridging loop can occur if the server is also connected to one of the switches.
STP is supported by both Cisco and Huawei switches. You can configure STP using the switch's configuration interface.
Here are some additional benefits of using STP:
STP can help to improve the performance of your network by reducing the amount of traffic that is broadcast on the network.
STP can also help to improve the reliability of your network by preventing network outages.
Overall, STP is an important protocol to use in any network that has two or more switches. This is because STP can help to improve the performance, reliability, and security of your network.
------------------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
#ChatGPT
explain run a root-cause-analysis (RCA) on this incident.
This is the output of command display logbuffer on Huawei Quidway
Dec 14 2023 04:31:55+03:00 BAU %%01SECE/4/ARPMISS(l)[124]:Attack occurred.(AttackType=Arp Miss Attack, SourceInterface=XGigabitEthernet2/0/0, SourceIP=172.16.33.8, AttackPackets=6 packets per second)
Performing a root cause analysis (RCA) involves investigating the incident thoroughly to determine the underlying cause or factors contributing to the problem. In this scenario, an ARP miss attack was detected on a Huawei Quidway switch:
Steps for Root Cause Analysis (RCA):
Understanding the Incident:
Identify the incident details:
Attack Type: ARP Miss Attack
Source Interface: XGigabitEthernet2/0/0
Source IP: 172.16.33.8
Attack Packets: 6 packets per second
Gather Additional Information:
Determine if there were any similar incidents in the recent past. Check logs or monitoring data for patterns or recurrent occurrences.
Review Network Configuration:
Examine the configuration of the switch, including interfaces, security settings, ARP-related configurations, and access controls. Ensure they align with best practices and security guidelines.
Analyze the Attack Source (172.16.33.8):
Investigate the device with IP address 172.16.33.8. Determine if it's a legitimate device, its role in the network, and whether it might have been compromised or misconfigured.
Check for Security Measures Implemented:
Verify if ARP inspection, rate limiting, or other security measures were enabled on the switch. Ensure they are properly configured and active.
Examine Traffic Patterns:
Analyze network traffic patterns, especially on the XGigabitEthernet2/0/0 interface. Look for anomalies or unusual traffic that might indicate ongoing or repeated attacks.
Identify Vulnerabilities or Weaknesses:
Determine if there are vulnerabilities in the network architecture or configuration that could be exploited for ARP-based attacks.
Consider Preventive Measures:
Evaluate potential preventive measures like enabling ARP inspection, rate limiting ARP requests, or implementing additional security controls to mitigate similar attacks.
Documentation and Recommendations:
Document the findings and recommendations for improving network security. Provide guidance for better defense mechanisms against ARP miss attacks.
RCA Summary:
Probable Cause: Possible misconfiguration, lack of security measures, or vulnerabilities exploited by the ARP miss attack.
Actions Needed: Review and enhance network security measures, reconfigure if necessary, conduct device analysis for 172.16.33.8, and strengthen network defenses against ARP-based threats.
By conducting a root cause analysis as outlined above, administrators can identify the cause of the ARP miss attack on the Huawei Quidway switch and implement corrective actions to prevent similar incidents in the future
---------------------------------------------------------------------------------------------------------------------
#Bard
explain run a root-cause-analysis (RCA) on this incident.
This is the output of command display logbuffer on Huawei Quidway
Dec 14 2023 04:31:55+03:00 BAU %%01SECE/4/ARPMISS(l)[124]:Attack occurred.(AttackType=Arp Miss Attack, SourceInterface=XGigabitEthernet2/0/0, SourceIP=172.16.33.8, AttackPackets=6 packets per second)
Sure, here is a root-cause analysis (RCA) of the ARP Miss Attack incident based on the provided log entry:
Incident: ARP Miss Attack
Date/Time: December 4, 2023, at 04:31:55+03:00
Affected Device: Huawei Quidway switch
Description: An ARP Miss Attack occurred on the XGigabitEthernet2/0/0 interface of the switch. The attacker sent 6 ARP requests per second for nonexistent IP addresses, flooding the network with unnecessary traffic. This attack could potentially degrade network performance, increase CPU usage, and disrupt network connectivity.
Root Cause Analysis:
Unauthorized IP Address Usage: The source IP address of the attack (172.16.33.8) is not assigned to any legitimate device on the network. This suggests that the attacker is using an unauthorized IP address to launch the attack.
Lack of ARP Security Measures: ARP security features, such as IP address validation, DHCP snooping, and ARP rate limiting, are not enabled on the switch. This allowed the attacker to flood the network with ARP requests without being blocked.
Potential Compromise of Attacker Device: The attacker's device may be compromised with malware or have misconfigured network settings that are causing it to send unauthorized ARP requests.
Corrective Actions:
Verify IP Address Assignment: Confirm that all devices on the network are using authorized IP addresses. If the source IP address is assigned to a legitimate device, investigate the device for potential compromise or misconfigurations.
Enable ARP Security Features: Enable ARP security features on the switch to prevent unauthorized devices from using IP addresses and reduce the impact of ARP Miss Attacks.
Investigate Attacker Device: If possible, identify the source of the attack and investigate the attacker's device for potential compromise or misconfigurations.
Continuously Monitor Network Traffic: Continuously monitor network traffic for any further ARP Miss Attacks or other suspicious activity.
Preventing Future Incidents:
Strong IP Address Management: Implement strict IP address management policies to ensure only authorized devices are assigned valid IP addresses.
Regular Network Audits: Conduct regular network audits to identify and address potential security vulnerabilities and misconfigurations.
Network Security Awareness Training: Educate network users about ARP Miss Attacks and the importance of using only authorized IP addresses and network configurations.
Up-to-date Software and Firmware: Ensure all network devices are running the latest software and firmware versions to address known vulnerabilities.
---------------------------------------------------------------------------------------------------------------------
explain how to troubleshoot
This is the output of command display logbuffer on Huawei Quidway
Dec 14 2023 04:31:55+03:00 BAU %%01SECE/4/ARPMISS(l)[124]:Attack occurred.(AttackType=Arp Miss Attack, SourceInterface=XGigabitEthernet2/0/0, SourceIP=172.16.33.8, AttackPackets=6 packets per second)
The log entry you provided indicates an ARP miss attack detected on the Huawei Quidway switch:
Log Analysis:
Log Message: Attack occurred.
Indicates the occurrence of a security event or attack.
Attack Type: Arp Miss Attack
Specifies the type of attack detected, involving Address Resolution Protocol.
Source Interface: XGigabitEthernet2/0/0
Specifies the interface or port where the attack originated.
Source IP: 172.16.33.8
Indicates the source IP address associated with the attack.
Attack Packets: 6 packets per second
Specifies the rate at which the attack occurred, in this case, 6 packets per second.
Troubleshooting Steps:
Investigate Source Device:
Examine the device with the IP address 172.16.33.8 for any signs of compromise or misconfiguration. Check if it's a legitimate device on your network.
Security Measures:
Implement or reinforce security measures to mitigate ARP miss attacks. This might involve enabling ARP inspection or rate-limiting ARP requests on the switch.
Network Monitoring:
Monitor network traffic patterns continuously. Look for similar incidents or unusual behavior on the network.
Logging and Alerts:
Configure the switch to generate alerts or logs for suspicious activities. Set up appropriate alerts to be notified of similar events in the future.
Update and Patching:
Ensure the switch's firmware and software are up-to-date with the latest patches and security updates provided by Huawei.
Review Network Configuration:
Review and validate the network configuration, ensuring it aligns with best practices for network security.
Consultation:
If necessary, seek assistance from network security professionals or Huawei support to analyze the event further and devise appropriate countermeasures.
Documentation and Response Plan:
Document the incident details and responses taken. Develop or update an incident response plan to handle similar security events in the future.
By following these troubleshooting steps, you can address the detected ARP miss attack, enhance network security, and prevent or mitigate similar security incidents on your Huawei Quidway switch.
---------------------------------------------------------------------------------------------------------------------
#ChatGPT
explain this Huawei Quidway :
Monitor network traffic patterns continuously. Look for similar incidents or unusual behavior on the network.
Monitoring network traffic patterns on a Huawei Quidway switch involves observing and analyzing the flow of data within the network infrastructure. Here's how you can approach this:
Steps to Monitor Network Traffic Patterns:
Network Traffic Analysis:
Use tools or features provided by the switch, such as traffic monitoring functionalities or network monitoring software, to capture and analyze network traffic.
Observing Traffic Flows:
Monitor the flow of data packets across various ports/interfaces of the switch. Identify typical traffic patterns and behavior during normal operation.
Identifying Anomalies:
Look for deviations from normal traffic patterns. This could include sudden spikes in traffic volume, unusual traffic patterns, or unexpected data transfer rates.
Traffic Filtering and Analysis:
Apply filters or rules to focus on specific types of traffic, such as ARP packets, ICMP (ping) traffic, or traffic to specific ports.
Utilize Logging and Alerts:
Set up logging mechanisms or alerts that trigger notifications when certain predefined conditions or thresholds are met. For example, alerting when there's a significant increase in ARP-related traffic or when ARP miss attacks are detected.
Use SNMP Monitoring:
Employ Simple Network Management Protocol (SNMP) monitoring tools to gather statistics, monitor network performance, and detect abnormalities or trends in traffic.
Regular Audits and Checks:
Conduct periodic audits or checks of network traffic to ensure consistency and detect any potential security threats or performance issues.
Benefits of Continuous Network Traffic Monitoring:
Early Threat Detection: Helps in the early identification of anomalies or security threats, including potential ARP-based attacks like ARP miss attacks.
Performance Optimization: Enables administrators to optimize network performance by identifying and addressing bottlenecks or unusual patterns that could impact network operations.
Proactive Maintenance: Allows for proactive maintenance by identifying issues before they escalate into major network disruptions or security breaches.
By continuously monitoring network traffic patterns on the Huawei Quidway switch, administrators can proactively identify irregularities, ensure network stability, and promptly respond to potential security threats or performance issues, contributing to a more secure and efficient network infrastructure
---------------------------------------------------------------------------------------------------------------------
#ChatGPT
explain this Huawei Quidway :
Security Measures:
Implement or reinforce security measures to mitigate ARP miss attacks. This might involve enabling ARP inspection or rate-limiting ARP requests on the switch.
The Huawei Quidway is a series of high-performance switches designed for enterprise-level networking. To enhance security and mitigate Address Resolution Protocol (ARP) miss attacks, the switch offers various features that can be configured:
Security Measures Available on Huawei Quidway :
ARP Inspection (Dynamic ARP Inspection - DAI):
DAI helps prevent ARP spoofing attacks by validating ARP packets before updating the switch's ARP table. It verifies the IP-to-MAC address bindings to ensure they are valid and discard suspicious or unauthorized ARP packets.
Rate Limiting ARP Requests:
This involves controlling the rate at which ARP requests are processed or forwarded by the switch. Limiting the number of ARP requests per second can prevent excessive traffic and potential ARP flooding attacks.
How to Implement These Security Measures:
Enabling ARP Inspection (DAI):
Configure DAI on the switch to inspect ARP packets. It involves identifying trusted interfaces (where legitimate ARP requests are expected) and enabling DAI globally or per interface.
DAI configuration typically includes specifying trusted ports, enabling ARP validation, setting ARP inspection rate limits, and determining the action for invalid ARP packets (e.g., drop or log).
Example Configuration Command:
[Quidway] arp anti-attack check user-bind enable
[Quidway] interface GigabitEthernet0/0/1
[Quidway-GigabitEthernet0/0/1] arp anti-attack trust enable
Rate Limiting ARP Requests:
Limit the rate of ARP requests received or transmitted by the switch to prevent ARP flooding attacks.
Example Configuration Command:
[Quidway] arp anti-attack rate-limit enable
[Quidway] arp anti-attack rate-limit 100
Benefits:
Enhanced Security: These measures help protect the network infrastructure by verifying and controlling ARP traffic, reducing the risk of ARP-based attacks like ARP spoofing and ARP flooding.
Prevention of Network Disruptions: Mitigating ARP miss attacks can prevent network congestion caused by excessive ARP requests or unauthorized ARP packets, ensuring smoother network operations.
By enabling ARP inspection and rate-limiting ARP requests on the Huawei Quidway switch, administrators can bolster the network's security posture and minimize the impact of potential ARP-based security threats. These configurations should be implemented in accordance with best practices and security requirements specific to the network environment.
---------------------------------------------------------------------------------------------------------------------
#ChatGPT
Log Message Breakdown:
Date and Time: Dec 4 2023 04:31:55+03:00
Indicates when the log entry was recorded. In this case, December 4th, 2023, at 04:31:55 local time with a time zone offset of +03:00.
Device Identifier: BAU
Device identifier or hostname for the switch generating the log.
Log Level and Log ID: %%01SECE/4/ARPMISS(l)[124]
Log level: 4 indicates a medium severity level.
Log ID: This ID categorizes the log entry. In this case, it's related to a security event (SECE) specifically indicating an ARP miss attack.
Log Message: Attack occurred.
General indication that an attack took place.
Attack Details:
Attack Type: Arp Miss Attack
Specifies the type of attack detected, in this case, an ARP miss attack. ARP miss attacks involve missing or incomplete ARP cache entries, possibly used for network reconnaissance or disruption.
Source Interface: XGigabitEthernet2/0/0
Identifies the interface on which the attack was detected.
Source IP: 172.16.33.8
Indicates the source IP address associated with the attack.
Attack Packets: 6 packets per second
Specifies the rate at which the attack occurred, in this case, at 6 packets per second.
---------------------------------------------------------------------------------------------------------------------
#Bard
The provided command display logbuffer and its output indicate that an ARP Miss Attack has occurred on the Huawei backbone switch. Let's break down the output to understand the details of the attack:
Timestamp:
Dec 14 2023 04:31:55+03:00
This indicates that the attack occurred on December 4, 2023, at 04:31:55 AM in the UTC+03:00 time zone.
Attack Type:
%%01SECE/4/ARPMISS(l)[124]:Attack occurred.(AttackType=Arp Miss Attack,
This part identifies the attack type as "Arp Miss Attack." An ARP Miss Attack occurs when an attacker sends ARP (Address Resolution Protocol) requests for nonexistent IP addresses, causing the switch to flood the network with ARP requests.
Source Interface:
SourceInterface=XGigabitEthernet2/0/0,
This indicates that the attack originated from the switch's physical interface XGigabitEthernet2/0/0.
Source IP:
SourceIP=172.66.33.80,
This specifies that the IP address of the device initiating the attack is 172.66.33.80.
Attack Packets:
AttackPackets=6 packets per second)
This indicates that the attacker is sending 6 ARP requests per second, potentially overwhelming the switch and disrupting network connectivity.
In summary, this log entry indicates that an ARP Miss Attack is ongoing on the switch, originating from 172.66.33.80 and targeting the XGigabitEthernet2/0/0 interface. The attacker is sending 6 ARP requests per second, potentially causing network disruption
---------------------------------------------------------------------------------------------------------------------
#gemini
Based on the provided log entry, a malicious actor launched an ARP Miss attack from the interface XGigabitEthernet2/0/0 of your network. While this information alone isn't enough for a definitive diagnosis, here are some possible root causes related to your infrastructure with Windows/Linux servers, wireless access controllers, wireless access points, and HP Aruba/Cisco/Dell network switches:
1. Compromised device on XGigabitEthernet2/0/0:
Windows/Linux server: A malware infection on a server connected to this interface could be sending gratuitous ARP requests or manipulating ARP responses, causing the ARP Miss attack.
Wireless access controller (WAC): A vulnerability in the WAC's firmware or configuration could allow attackers to exploit it and launch the attack from there.
Wireless access point (WAP): Similar to WACs, vulnerabilities in the WAP's firmware or configuration could be exploited for malicious purposes.
2. Misconfiguration on Network Switches:
Static ARP entries: Incorrect static ARP entries on switches connecting to XGigabitEthernet2/0/0 could lead to legitimate traffic being directed incorrectly, triggering ARP Miss attacks.
Security flaws: Unpatched vulnerabilities in the switch firmware could create openings for attackers to exploit and manipulate ARP entries.
3. Network Misconfiguration:
Segmentation issues: Improper network segmentation might allow untrusted devices to access internal segments, facilitating ARP Miss attacks.
VLAN configuration: Incorrect VLAN configuration could lead to broadcast traffic reaching unintended segments, triggering ARP Miss attacks on multiple devices.
4. Other possibilities:
Spoofed source IP: The attacker might be spoofing the source IP address of a legitimate device connected to XGigabitEthernet2/0/0 to mask their actual location.
Man-in-the-middle attack: An attacker might be positioned between the legitimate device and the switch, manipulating ARP traffic and causing the attack.
Recommendations:
Isolate XGigabitEthernet2/0/0: Disconnect the interface temporarily to prevent further attacks and identify the compromised device.
Investigate connected devices: Analyze logs and security software on devices connected to XGigabitEthernet2/0/0 to identify suspicious activity.
Review switch configurations: Check for static ARP entries and potential security vulnerabilities in the switch firmware.
Audit network segmentation: Ensure proper segmentation prevents untrusted devices from accessing internal segments.
Update firmware and patch vulnerabilities: Keep all devices and switches updated with the latest firmware and security patches.
Enable security features: Utilize features like dynamic ARP inspection and port security on switches to mitigate ARP attacks.
Consider intrusion detection/prevention systems (IDS/IPS): Implement these systems to detect and block malicious network activity.
Remember, this is just a starting point, and further investigation is crucial to pinpoint the exact root cause and implement effective mitigation strategies. Consulting with network security professionals can offer valuable assistance in this process.
------------------------------------------------------------------------------------------------------------------------------
#ChatGPT
The log entry indicates an Arp Miss Attack on the specified Huawei Quidway device. As a network administrator, the possible root causes for such an attack could be diverse and may involve various elements in your infrastructure. Here are some potential root causes to consider:
Network Misconfigurations:
Subnet Mismatch: Ensure that the subnet configured on the network device matches the subnet of the IP address mentioned in the log entry (172.16.33.8). A mismatch can lead to ARP requests for non-local addresses.
Device-Specific Issues:
Faulty Device: Investigate if there are hardware or software issues on the Huawei Quidway device itself. This could include firmware bugs or hardware malfunctions.
Attack or Malicious Activity:
Denial of Service (DoS) Attack: Arp Miss Attacks might be part of a larger-scale DoS attack. Monitor the network for unusual patterns in traffic, and consider implementing measures to mitigate DoS attacks.
Network Topology Issues:
Broadcast Storms: Excessive ARP requests could be caused by broadcast storms. Check for broadcast storms or other abnormal broadcast behavior.
DHCP Issues:
DHCP Misconfigurations: Incorrect DHCP configurations may lead to IP address conflicts, resulting in ARP miss attacks. Ensure that DHCP servers are properly configured and are not assigning duplicate IP addresses.
Wireless Network Considerations:
Rogue Devices: In wireless networks, the presence of rogue devices could cause ARP miss attacks. Implement measures to detect and mitigate rogue devices.
Security Measures:
Firewall Rules: Review firewall rules to ensure that they are correctly configured to prevent unauthorized or malicious traffic.
Monitoring and Analysis:
Network Traffic Analysis: Use network monitoring tools to analyze network traffic. Look for patterns or anomalies that could indicate malicious activity.
Update and Patching:
Firmware/Software Updates: Ensure that all network devices, including switches and routers, are running the latest firmware or software versions. Regularly update and patch devices to address security vulnerabilities.
Collaboration with Vendors:
Vendor Support: If the issue persists, consider reaching out to Huawei support for assistance. They can provide insights into device-specific behavior and potential solutions.
Integration with Other Devices:
Integration Issues: Check if the Huawei Quidway device is properly integrated with other network components, such as wireless access controllers, switches, and servers. Misconfigurations in integration might lead to ARP miss attacks.
Policy and Access Controls:
Access Policies: Review access control policies to ensure that only authorized devices have access to the network.
Investigating the root cause may involve a combination of analyzing logs from various devices, network traffic monitoring, and collaboration with other teams or vendors. Regularly auditing and securing the network infrastructure can also help prevent and identify such issues
------------------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------------------------
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment