12-25
Cisco SCE 8000 10GBE Software Configuration Guide
OL-30621-02
Chapter 12 Identifying and Preventing Distributed Denial-of-Service Attacks
Monitoring Attack Filtering
Following are the possible values that may appear in the fields indicated in the information strings (''):
•
'action'
–
Report
–
Block
•
'forced-action' is one of the following values, depending on the configured force-filter action.
–
block of flows
–
report
•
'IP-info' is in one of the following formats, depending on the direction of the attack, and whether
one or two IP addresses were detected
–
from IP address A.B.C.D
–
on IP address A.B.C.D
–
from IP address A.B.C.D to IP address A.B.C.D
•
'side'
–
subscriber
–
network
•
'protocol'
–
TCP
–
UDP
–
ICMP
–
other
•
'rate1' and 'rate2' are numbers
•
'duration' is a number.
•
'total-flows' is one of the following strings, depending on the attack action:
–
If 'action' is block: 'number' flows blocked.
–
If 'action' is report: attack comprised of 'number' flows.
•
'hw-filter'
–
If the attack was not filtered by a hardware filter: empty string
–
If the attack was filtered by a hardware filter: HW filters used, actual attack duration is probably
smaller than reported above, actual amount of flows handled is probably larger than reported
above.