After policies for traffic diversion and injection are configured and before traffic is diverted, enable the loop check function on the cleaning device to check the route for traffic diversion and injection.
This function is configured on the AntiDDoS.
To configure traffic diversion and injection, modify the original route on the network first. In the complex network environment, if the route is incorrectly configured, the loop occurs and therefore normal services are adversely affected. To identify the route fault in a timely manner, you are advised to run the following command to enable the loop check function in practice.
After the function is enabled, the system automatically checks whether received packets are repetitive. If yes, the loop occurs. After loop counts reaches a value, the system automatically cancels the traffic-diversion route to the destination IP address.
By default, the function is disabled.
Parameter match-time specifies match times for loop packets. When the match times exceeds the match-time value, the system cancels the traffic-diversion route. The default match times is 4, that is, the system cancels the traffic-diversion route when loop packets match for the fifth times.
After the check is complete, run the undo anti-ddos loop-check command to disable the loop check function.