573
The global threshold applies to global ICMP flood attack detection. Adjust the threshold according to
the application scenarios. If the number of ICMP packets sent to a protected server, such as an
HTTP or FTP server, is normally large, set a large threshold. A small threshold might affect the server
services. For a network that is unstable or susceptible to attacks, set a small threshold.
Examples
# Set the global threshold to 100 for triggering ICMP flood attack prevention in attack defense policy
atk-policy-1
.
<Sysname> system-view
[Sysname] attack-defense policy atk-policy-1
[Sysname-attack-defense-policy-atk-policy-1] icmp-flood threshold 100
Related commands
icmp-flood action
icmp-flood detect ip
icmp-flood detect non-specific
icmpv6-flood action
Use
icmpv6-flood action
to specify global actions against ICMPv6 flood attacks.
Use
undo icmpv6-flood action
to restore the default.
Syntax
icmpv6-flood action
{
drop
|
logging
}
*
undo icmpv6-flood action
Default
No global action is specified for ICMPv6 flood attacks.
Views
Attack defense policy view
Predefined user roles
network-admin
mdc-admin
Parameters
drop
: Drops subsequent ICMPv6 packets destined for the victim IP addresses.
logging
: Enables logging for ICMPv6 flood attack events.
Examples
# Specify
drop
as the global action against ICMPv6 flood attacks in attack defense policy
atk-policy-1
.
<Sysname> system-view
[Sysname] attack-defense policy atk-policy-1
[Sysname-attack-defense-policy-atk-policy-1] icmpv6-flood action drop
Related commands
icmpv6-flood detect ipv6
icmpv6-flood detect non-specific
icmpv6-flood threshold