562
•
Destination IP address.
•
Source port.
•
Destination port.
•
Protocol.
•
L3VPN instance.
•
The
fragment
keyword for matching non-first fragments.
If the specified ACL does not exist or does not contain a rule, attack detection exemption does not
take effect.
Examples
# Configure an ACL to permit packets sourced from 1.1.1.1. Configure attack detection exemption
for packets matching the ACL in attack defense policy
atk-policy-1
.
<Sysname> system-view
[Sysname] acl basic 2001
[Sysname-acl-ipv4-basic-2001] rule permit source 1.1.1.1 0
[Sysname-acl-ipv4-basic-2001] quit
[Sysname] attack-defense policy atk-policy-1
[attack-defense-policy-atk-policy-1] exempt acl 2001
Related commands
attack-defense policy
fin-flood action
Use
fin-flood action
to specify global actions against FIN flood attacks.
Use
undo fin-flood action
to restore the default.
Syntax
fin-flood action
{
drop
|
logging
} *
undo fin-flood action
Default
No global action is specified for FIN flood attacks.
Views
Attack defense policy view
Predefined user roles
network-admin
mdc-admin
Parameters
drop
: Drops subsequent FIN packets destined for the victim IP addresses.
logging
: Enables logging for FIN flood attack events.
Examples
# Specify
drop
as the global action against FIN flood attacks in attack defense policy
atk-policy-1
.
<Sysname> system-view
[Sysname] attack-defense policy atk-policy-1
[Sysname-attack-defense-policy-atk-policy-1] fin-flood action drop