921
Usage guidelines
With SYN flood attack detection configured for an IP address, the device is in attack detection state.
When the sending rate of SYN packets to the IP address reaches the threshold, the device enters
prevention state and takes the specified actions. When the rate is below the silence threshold
(three-fourths of the threshold), the device returns to the attack detection state.
Examples
# Configure SYN flood attack detection for 192.168.1.2 in the attack defense policy
atk-policy-1
.
<Sysname> system-view
[Sysname] attack-defense policy atk-policy-1
[Sysname-attack-defense-policy-atk-policy-1] syn-flood detect ip 192.168.1.2 threshold
2000
Related commands
syn-flood action
syn-flood detect non-specific
syn-flood threshold
syn-flood detect non-specific
Use
syn-flood detect non-specific
to enable global SYN flood attack detection.
Use
undo syn-flood detect non-specific
to disable global SYN flood attack detection.
Syntax
syn-flood detect non-specific
undo syn-flood detect non-specific
Default
Global SYN flood attack detection is disabled.
Views
Attack defense policy view
Predefined user roles
network-admin
Usage guidelines
The global SYN flood attack detection applies to all IP addresses except for those specified by the
syn-flood detect
command. The global detection uses the global trigger threshold set by the
syn-flood threshold
command and global actions specified by the
syn-flood action
command.
Examples
# Enable global SYN flood attack detection in the attack defense policy
atk-policy-1
.
<Sysname> system-view
[Sysname] attack-defense policy atk-policy-1
[Sysname-attack-defense-policy-atk-policy-1] syn-flood detect non-specific
Related commands
syn-flood action
syn-flood detect
syn-flood threshold