581
Examples
# Configure RST flood attack detection for 192.168.1.2 in attack defense policy
atk-policy-1
.
<Sysname> system-view
[Sysname] attack-defense policy atk-policy-1
[Sysname-attack-defense-policy-atk-policy-1] rst-flood detect ip 192.168.1.2 threshold
2000
Related commands
rst-flood action
rst-flood detect non-specific
rst-flood threshold
rst-flood detect non-specific
Use
rst-flood detect non-specific
to enable global RST flood attack detection.
Use
undo rst-flood detect non-specific
to disable global RST flood attack detection.
Syntax
rst-flood detect non-specific
undo rst-flood detect non-specific
Default
Global RST flood attack detection is disabled.
Views
Attack defense policy view
Predefined user roles
network-admin
mdc-admin
Usage guidelines
The global RST flood attack detection applies to all IP addresses except for those specified by the
rst-flood detect
command. The global detection uses the global trigger threshold set by the
rst-flood threshold
command and global actions specified by the
rst-flood action
command.
Examples
# Enable global RST flood attack detection in attack defense policy
atk-policy-1
.
<Sysname> system-view
[Sysname] attack-defense policy atk-policy-1
[Sysname-attack-defense-policy-atk-policy-1] rst-flood detect non-specific
Related commands
rst-flood action
rst-flood detect
rst-flood threshold
rst-flood threshold
Use
rst-flood threshold
to set the global threshold for triggering RST flood attack prevention.