![HP FlexNetwork MSR Series Скачать руководство пользователя страница 934](http://html.mh-extra.com/html/hp/flexnetwork-msr-series/flexnetwork-msr-series_command-reference-manual_163078934.webp)
916
Use
undo syn-ack-flood action
to restore the default.
Syntax
syn-ack-flood action
{
client-verify
|
drop
|
logging
} *
undo syn-ack-flood action
Default
No global action is specified for SYN-ACK flood attacks.
Views
Attack defense policy view
Predefined user roles
network-admin
Parameters
client-verify
: Adds the victim IP addresses to the protected IP list for TCP client verification. If TCP
client verification is enabled, the device provides proxy services for protected servers.
drop
: Drops subsequent SYN-ACK packets destined for the victim IP addresses.
logging
: Enables logging for SYN-ACK flood attack events.
Usage guidelines
For the SYN-ACK flood attack detection to collaborate with the TCP client verification, make sure the
client-verify
keyword is specified and the TCP client verification is enabled. To enable TCP client
verification, use the
client-verify tcp enable
command.
Examples
# Specify
drop
as the global action against SYN-ACK flood attacks in the attack defense policy
atk-policy-1
.
<Sysname> system-view
[Sysname] attack-defense policy atk-policy-1
[Sysname-attack-defense-policy-atk-policy-1] syn-ack-flood action drop
Related commands
client-verify tcp enable
syn-ack-flood detect
syn-ack-flood detect non-specific
syn-ack-flood threshold
syn-ack-flood detect
Use
syn-ack-flood detect
to configure IP address-specific SYN-ACK flood attack detection.
Use
undo syn-ack-flood detect
to remove the IP address-specific SYN-ACK flood attack detection
configuration.
Syntax
syn-ack-flood detect
{
ip
ipv4-address
|
ipv6
ipv6-address
} [
vpn-instance vpn-instance-name
]
[
threshold threshold-value
] [
action
{ {
client-verify
|
drop
|
logging
} * |
none
} ]
undo syn-ack-flood detect
{
ip
ipv4-address
|
ipv6
ipv6-address
} [
vpn-instance
vpn-instance-name
]