597
udp-flood detect
Use
udp-flood detect
to configure IP address-specific UDP flood attack detection.
Use
undo udp-flood detect
to remove the IP address-specific UDP flood attack detection
configuration.
Syntax
udp-flood detect
{
ip ipv4-address
|
ipv6 ipv6-address
} [
vpn-instance vpn-instance-name
]
[
threshold threshold-value
] [
action
{ {
drop
|
logging
} * |
none
} ]
undo udp-flood detect
{
ip ipv4-address
|
ipv6 ipv6-address
} [
vpn-instance vpn-instance-name
]
Default
IP address-specific UDP flood attack detection is not configured.
Views
Attack defense policy view
Predefined user roles
network-admin
mdc-admin
Parameters
ip
ipv4-address
: Specifies the IPv4 address to be protected. The
ip-address
argument cannot be all
1s or 0s.
ipv6
ipv6-address
: Specifies the IPv6 address to be protected.
vpn-instance vpn-instance-name
: Specifies the MPLS L3VPN instance to which the protected IP
address belongs. The
vpn-instance-name
argument is a case-sensitive string of 1 to 31 characters.
Do not specify this option if the protected IP address is on the public network.
threshold
threshold-value
: Specifies the threshold for triggering UDP flood attack prevention. The
value range is 1 to 1000000 in units of UDP packets sent to the specified IP address per second.
action
: Specifies the actions when a UDP flood attack is detected. If no action is specified, the global
actions set by the
udp-flood action
command apply.
drop
: Drops subsequent UDP packets destined for the protected IP address.
logging
: Enables logging for UDP flood attack events.
none
: Takes no action.
Usage guidelines
With UDP flood attack detection configured for an IP address, the device is in attack detection state.
When the sending rate of UDP packets to the IP address reaches the threshold, the device enters
prevention state and takes the specified actions. When the rate is below the silence threshold
(three-fourths of the threshold), the device returns to the attack detection state.
You can configure UDP flood attack detection for multiple IP addresses in one attack defense policy.
Examples
# Configure UDP flood attack detection for 192.168.1.2 in attack defense policy
atk-policy-1
.
<Sysname> system-view
[Sysname] attack-defense policy atk-policy-1
[Sysname-attack-defense-policy-atk-policy-1] udp-flood detect ip 192.168.1.2 threshold
2000
Содержание FlexNetwork 7500 Series
Страница 350: ...335 Related commands display port security port security enable ...
Страница 379: ...364 Sysname system view Sysname keychain abc mode absolute Sysname keychain abc tcp kind 252 ...
Страница 519: ...504 Related commands display ssh2 algorithm ssh2 algorithm cipher ssh2 algorithm key exchange ssh2 algorithm mac ...