547
Table 81 Command output
Field
Description
Totally 1 attackers
Total number of IPv6 scanning attackers.
IPv6 address
IPv6 address of the attacker.
VPN instance
MPLS L3VPN instance to which the attacker IPv6 address belongs. If the
attacker IPv6 address is on the public network, this field displays hyphens
(--).
Detected on
Where the attack is detected: the device (
Local
).
Duration(min)
The amount of time the attack lasts, in minutes.
Related commands
display attack-defense scan victim ipv6
scan detect
display attack-defense scan victim ip
Use
display attack-defense scan victim ip
to display information about IPv4 scanning attack
victims.
Syntax
In standalone mode:
display attack-defense scan victim ip
[ [
local
]
[
slot
slot-number
] ] [
count
]
In IRF mode:
display attack-defense scan victim ip
[ [
local
] [
chassis
chassis-number
slot
slot-number
]
]
[
count
]
Views
Any view
Predefined user roles
network-admin
network-operator
mdc-admin
mdc-operator
Parameters
local
: Specifies the device.
slot slot-number
: Specifies a card by its slot number. This option is available only when you specify
the device. If you do not specify a card, this command displays information about IPv4 scanning
attack victims for all cards. (In standalone mode.)
chassis
chassis-number
slot
slot-number
: Specifies a card on an IRF member device. The
chassis-number
argument represents the member ID of the IRF member device. The
slot-number
argument represents the slot number of the card. This option is available only when you specify the
device. If you do not specify a card, this command displays information about IPv4 scanning attack
victims for all cards. (In IRF mode.)
count
: Displays the number of matching IPv4 scanning attack victims.
Содержание FlexNetwork 7500 Series
Страница 350: ...335 Related commands display port security port security enable ...
Страница 379: ...364 Sysname system view Sysname keychain abc mode absolute Sysname keychain abc tcp kind 252 ...
Страница 519: ...504 Related commands display ssh2 algorithm ssh2 algorithm cipher ssh2 algorithm key exchange ssh2 algorithm mac ...