559
dns-flood detect non-specific
Use
dns-flood detect non-specific
to enable global DNS flood attack detection.
Use
undo dns-flood detect non-specific
to disable global DNS flood attack detection.
Syntax
dns-flood detect non-specific
undo dns-flood detect non-specific
Default
Global DNS flood attack detection is disabled.
Views
Attack defense policy view
Predefined user roles
network-admin
mdc-admin
Usage guidelines
The global DNS flood attack detection applies to all IP addresses except for those specified by the
dns-flood detect
command. The global detection uses the global trigger threshold set by the
dns-flood threshold
command and global actions specified by the
dns-flood action
command.
Examples
# Enable global DNS flood attack detection in attack defense policy
atk-policy-1
.
<Sysname> system-view
[Sysname] attack-defense policy atk-policy-1
[Sysname-attack-defense-policy-atk-policy-1] dns-flood detect non-specific
Related commands
dns-flood action
dns-flood detect
dns-flood threshold
dns-flood port
Use
dns-flood port
to specify the global ports to be protected against DNS flood attacks.
Use
undo dns-flood port
to restore the default.
Syntax
dns-flood port port-list
undo dns-flood port
Default
The global DNS flood attack prevention protects port 53.
Views
Attack defense policy view
Predefined user roles
network-admin