572
Views
Attack defense policy view
Predefined user roles
network-admin
mdc-admin
Usage guidelines
The global ICMP flood attack detection applies to all IP addresses except for those specified by the
icmp-flood detect ip
command. The global detection uses the global trigger threshold set by the
icmp-flood threshold
command and global actions specified by the
icmp-flood action
command.
Examples
# Enable global ICMP flood attack detection in attack defense policy
atk-policy-1
.
<Sysname> system-view
[Sysname] attack-defense policy atk-policy-1
[Sysname-attack-defense-policy-atk-policy-1] icmp-flood detect non-specific
Related commands
icmp-flood action
icmp-flood detect ip
icmp-flood threshold
icmp-flood threshold
Use
icmp-flood threshold
to set the global threshold for triggering ICMP flood attack prevention.
Use
undo icmp-flood threshold
to restore the default.
Syntax
icmp-flood threshold threshold-value
undo icmp-flood threshold
Default
The global threshold is 1000 for triggering ICMP flood attack prevention.
Views
Attack defense policy view
Predefined user roles
network-admin
mdc-admin
Parameters
threshold-value
: Specifies the threshold value. The value range is 1 to 1000000 in units of ICMP
packets sent to an IP address per second.
Usage guidelines
With global ICMP flood attack detection configured, the device is in attack detection state. When the
sending rate of ICMP packets to an IP address reaches the threshold, the device enters prevention
state and takes the specified actions. When the rate is below the silence threshold (three-fourths of
the threshold), the device returns to the attack detection state.
Содержание FlexNetwork 7500 Series
Страница 350: ...335 Related commands display port security port security enable ...
Страница 379: ...364 Sysname system view Sysname keychain abc mode absolute Sysname keychain abc tcp kind 252 ...
Страница 519: ...504 Related commands display ssh2 algorithm ssh2 algorithm cipher ssh2 algorithm key exchange ssh2 algorithm mac ...