428
Usage guidelines
Adjust the thresholds according to your actual network conditions. For the protected objects that
usually have high SYN traffic, for example, HTTP server or FTP server, set a bigger action threshold
to avoid impact on normal services. For poor network conditions, or attack-sensitive networks, you
can set a smaller action threshold. If the link bandwidth of the protected network is small, you can set
a smaller silence threshold to help release the network traffic pressure.
Examples
# Configure SYN flood attack protection, set the global action threshold to 3000 packets per second
and the global silence threshold to 1000 packets per second.
<Sysname> system-view
[Sysname] attack-defense policy 1
[Sysname-attack-defense-policy-1] defense syn-flood rate-threshold high 3000 low 1000
Related commands
•
defense syn-flood enable
•
display attack-defense policy
defense udp-flood action drop-packet
Use
defense udp-flood action drop-packet
to configure the device to drop UDP flood attack
packets.
Use
undo defense udp-flood action
to restore the default.
Syntax
defense udp-flood action drop-packet
undo defense udp-flood action
Default
The device does not process the attack packets if it detects a UDP flood attack.
Views
Attack protection policy view
Default command level
2: System level
Examples
# Configure attack protection policy 1 to drop UDP flood packets.
<Sysname> system-view
[Sysname] attack-defense policy 1
[Sysname-attack-defense-policy-1] defense udp-flood action drop-packet
Related commands
•
defense udp-flood enable
•
defense udp-flood ip
•
defense udp-flood rate-threshold
•
display attack-defense policy
defense udp-flood enable
Use
defense udp-flood enable
to enable UDP flood attack protection.