568
mdc-admin
Usage guidelines
The global HTTP flood attack detection applies to all IP addresses except for those specified by the
http-flood detect
command. The global detection uses the global trigger threshold set by the
http-flood threshold
command and global actions specified by the
http-flood action
command.
Examples
# Enable global HTTP flood attack detection in attack defense policy
atk-policy-1
.
<Sysname> system-view
[Sysname] attack-defense policy atk-policy-1
[Sysname-attack-defense-policy-atk-policy-1] dns-flood detect non-specific
Related commands
http-flood action
http-flood detect
http-flood threshold
http-flood port
Use
http-flood port
to specify the global ports to be protected against HTTP flood attacks.
Use
undo http-flood port
to restore the default.
Syntax
http-flood port port-list
undo http-flood port
Default
The global HTTP flood attack prevention protects port 80.
Views
Attack defense policy view
Predefined user roles
network-admin
mdc-admin
Parameters
port-list
: Specifies a space-separated list of up to 65535 port number items. Each item specifies a
port by its port number or a range of ports in the form of
start-port-number
to
end-port-number
. The
end-port-number
cannot be smaller than the
start-port-number
.
Usage guidelines
The device detects only HTTP packets destined for the specified ports.
The global ports apply to global HTTP flood attack detection and IP address-specific HTTP flood
attack detection with no port specified.
Examples
# Specify the ports 80 and 8080 as the global ports to be protected against HTTP flood attacks in
attack the defense policy
atk-policy-1
.
<Sysname> system-view
[Sysname] attack-defense policy atk-policy-1
[Sysname-attack-defense-policy-atk-policy-1] http-flood port 80 8080
Содержание FlexNetwork 7500 Series
Страница 350: ...335 Related commands display port security port security enable ...
Страница 379: ...364 Sysname system view Sysname keychain abc mode absolute Sysname keychain abc tcp kind 252 ...
Страница 519: ...504 Related commands display ssh2 algorithm ssh2 algorithm cipher ssh2 algorithm key exchange ssh2 algorithm mac ...