
908
Views
Attack defense policy view
Predefined user roles
network-admin
Usage guidelines
The global RST flood attack detection applies to all IP addresses except for those specified by the
rst-flood detect
command. The global detection uses the global trigger threshold set by the
rst-flood threshold
command and global actions specified by the
rst-flood action
command.
Examples
# Enable global RST flood attack detection in the attack defense policy
atk-policy-1
.
<Sysname> system-view
[Sysname] attack-defense policy atk-policy-1
[Sysname-attack-defense-policy-atk-policy-1] rst-flood detect non-specific
Related commands
rst-flood action
rst-flood detect
rst-flood threshold
rst-flood threshold
Use
rst-flood threshold
to set the global threshold for triggering RST flood attack prevention.
Use
undo rst-flood threshold
to restore the default.
Syntax
rst-flood threshold threshold-value
undo rst-flood threshold
Default
The global threshold is 1000 for triggering RST flood attack prevention.
Views
Attack defense policy view
Predefined user roles
network-admin
Parameters
threshold-value
: Specifies the threshold value. The value range is 1 to 1000000 in units of RST
packets sent to an IP address per second.
Usage guidelines
The global threshold applies to global RST flood attack detection. Adjust the threshold according to
the application scenarios. If the number of RST packets sent to a protected server, such as an HTTP
or FTP server, is normally large, set a large threshold. A small threshold might affect the server
services. For a network that is unstable or susceptible to attacks, set a small threshold.
With global RST flood attack detection configured, the device is in attack detection state. When the
sending rate of RST packets to an IP address reaches the threshold, the device enters prevention
state and takes the specified actions. When the rate is below the silence threshold (three-fourths of
the threshold), the device returns to the attack detection state.
Summary of Contents for FlexNetwork MSR Series
Page 1005: ...987 ...