588
Parameters
high
: Specifies the high level. None of the currently supported single-packet attacks belongs to this
level.
info
: Specifies the informational level. For example, large ICMP packet attack is on this level.
low
: Specifies the low level. For example, the traceroute attack is on this level.
medium
: Specifies the medium level. For example, the WinNuke attack is on this level.
drop
: Drops packets that match the specified level.
logging
: Enable logging for single-packet attacks on the specified level.
none
: Takes no action.
Usage guidelines
According to their severity, single-packet attacks are divided into four levels:
info
,
low
,
medium
, and
high
. Enabling signature detection for a specific level enables signature detection for all
single-packet attacks on that level.
If you enable signature detection for a single-packet attack also by using the
signature detect
command, action parameters in the
signature detect
command take effect.
Examples
# Specify the action against informational-level single-packet attacks as
drop
in attack defense
policy
atk-policy-1
.
<Sysname> system-view
[Sysname] attack-defense policy 1
[Sysname-attack-defense-policy-1] signature level info action drop
Related commands
signature detect
signature level detect
signature level detect
Use
signature level detect
to enable signature detection for single-packet attacks on a specific
level.
Use
undo signature level detect
to disable signature detection for single-packet attacks on a
specific level.
Syntax
signature level
{
high
|
info
|
low
|
medium
}
detect
undo signature level
{
high
|
info
|
low
|
medium
}
detect
Default
Signature detection is disabled for all levels of single-packet attacks.
Views
Attack defense policy view
Predefined user roles
network-admin
mdc-admin
Содержание FlexNetwork 7500 Series
Страница 350: ...335 Related commands display port security port security enable ...
Страница 379: ...364 Sysname system view Sysname keychain abc mode absolute Sysname keychain abc tcp kind 252 ...
Страница 519: ...504 Related commands display ssh2 algorithm ssh2 algorithm cipher ssh2 algorithm key exchange ssh2 algorithm mac ...