589
Parameters
high
: Specifies the high level. None of the currently supported single-packet attacks belongs to this
level.
info
: Specifies the informational level. For example, large ICMP packet attack is on this level.
low
: Specifies the low level. For example, the traceroute attack is on this level.
medium
: Specifies the medium level. For example, the WinNuke attack is on this level.
Usage guidelines
According to their severity, single-packet attacks are divided into four levels:
info
,
low
,
medium
, and
high
. Enabling signature detection for a specific level enables signature detection for all
single-packet attacks on that level. Use the
signature level action
command to specify the actions
against single-packet attacks on a specific level. If you enable signature detection for a single-packet
attack also by using the
signature detect
command, action parameters in the
signature detect
command take effect.
To display the level to which a single-packet attack belongs, use the
display attack-defense policy
command.
Examples
# Enable signature detection for informational-level single-packet attacks in attack defense policy
atk-policy-1
.
<Sysname> system-view
[Sysname] attack-defense policy 1
[Sysname-attack-defense-policy-1] signature level info detect
Related commands
display attack-defense policy
signature detect
signature level action
syn-ack-flood action
Use
syn-ack-flood action
to specify global actions against SYN-ACK flood attacks.
Use
undo syn-ack-flood action
to restore the default.
Syntax
syn-ack-flood action
{
drop
|
logging
}*
undo syn-ack-flood action
Default
No global action is specified for SYN-ACK flood attacks.
Views
Attack defense policy view
Predefined user roles
network-admin
mdc-admin
Parameters
drop
: Drops subsequent SYN-ACK packets destined for the victim IP addresses.
logging
: Enables logging for SYN-ACK flood attack events.
Содержание FlexNetwork 7500 Series
Страница 350: ...335 Related commands display port security port security enable ...
Страница 379: ...364 Sysname system view Sysname keychain abc mode absolute Sysname keychain abc tcp kind 252 ...
Страница 519: ...504 Related commands display ssh2 algorithm ssh2 algorithm cipher ssh2 algorithm key exchange ssh2 algorithm mac ...