539
HTTP flood 10000 - 80,8080 Enabled
Flood attack defense for protected IP addresses:
Address VPN instance Flood type Thres(pps) Actions Ports
1::1 -- FIN-FLOOD 10 L,D -
192.168.1.1 -- SYN-ACK-FLOOD 10 - -
1::1 -- FIN-FLOOD - L -
2013:2013:2013:2013: -- DNS-FLOOD 100 L,CV 53
2013:2013:2013:2013
Table 76 Command output
Field
Description
Policy name
Name of the attack defense policy.
Applied list
Locations to which the attack defense policy is applied:
Local
(
Local
indicates that the policy is applied to the device).
Exempt IPv4 ACL
IPv4 ACL used for attack detection exemption.
Exempt IPv6 ACL
IPv6 ACL used for attack detection exemption.
Actions
Attack prevention actions:
•
BS
—Blocking sources.
•
L
—Logging.
•
D
—Dropping packets.
•
N
—No action.
Signature attack defense
configuration
Configuration information about single-packet attack detection and
prevention.
Signature name
Type of the single-packet attack.
Defense
Whether attack detection is enabled.
Level
Level of the single-packet attack,
info
,
low
,
medium
, or
high
.
Currently, no high-level single-packet attacks exist.
Scan attack defense
configuration
Configuration information about scanning attack detection and prevention.
Level
Level of the scanning attack detection:
low
,
medium
, or
high
.
Flood attack defense
configuration
Configuration information about flood attack detection and prevention.
Flood type
Type of the flood attack:
•
ACK flood.
•
DNS flood.
•
FIN flood.
•
ICMP flood.
•
ICMPv6 flood.
•
SYN flood.
•
SYN-ACK flood.
•
UDP flood.
•
RST flood.
•
HTTP flood.
Global thres (pps)
Global threshold for triggering the flood attack prevention, in units of
packets sent to an IP address per second. The default is 1000 pps.