433
Step Command
Remarks
attack detection.
detection is disabled.
4.
Set the global trigger
threshold for RST flood
attack prevention.
rst-flood threshold
threshold-value
The default setting is 1000.
5.
Specify global actions
against RST flood attacks.
rst-flood action
{
drop
|
logging
} *
By default, no global action is
specified for RST flood attacks.
6.
Configure IP
address-specific RST flood
attack detection.
rst-flood
detect
{
ip
ipv4-address
|
ipv6
ipv6-address
} [
vpn-instance
vpn-instance-name
] [
threshold
threshold-value
] [
action
{ {
drop
|
logging
} * |
none
} ]
By default, IP address-specific RST
flood attack detection is not
configured.
Configuring an ICMP flood attack defense policy
Step Command
Remarks
1.
Enter system view.
system-view
N/A
2.
Enter attack defense policy
view.
attack-defense policy
policy-name
N/A
3.
Enable global ICMP flood
attack detection.
icmp-flood detect non-specific
By default, global ICMP flood attack
detection is disabled.
4.
Set the global trigger
threshold for ICMP flood
attack prevention.
icmp-flood threshold
threshold-value
The default setting is 1000.
5.
Specify global actions
against ICMP flood attacks.
icmp-flood action
{
drop
|
logging
} *
By default, no global action is
specified for ICMP flood attacks.
6.
Configure IP
address-specific ICMP
flood attack detection.
icmp-flood detect
ip ip-address
[
vpn-instance
vpn-instance-name
] [
threshold
threshold-value
] [
action
{ {
drop
|
logging
} * |
none
} ]
By default, IP address-specific
ICMP flood attack detection is not
configured.
Configuring an ICMPv6 flood attack defense policy
Step Command
Remarks
1.
Enter system view.
system-view
N/A
2.
Enter attack defense policy
view.
attack-defense policy
policy-name
N/A
3.
Enable global ICMPv6 flood
attack detection.
icmpv6-flood detect
non-specific
By default, global ICMPv6 flood
attack detection is disabled.
4.
Set the global trigger
threshold for ICMPv6 flood
attack prevention.
icmpv6-flood threshold
threshold-value
The default setting is 1000.
5.
Specify global actions
against ICMPv6 flood
attacks.
icmpv6-flood action
{
drop
|
logging
} *
By default, no global action is
specified for ICMPv6 flood attacks.
6.
Configure IP
address-specific ICMPv6
flood attack detection.
icmpv6-flood detect
ipv6
ipv6-address
[
vpn-instance
vpn-instance-name
] [
threshold
threshold-value
] [
action
{ {
drop
|
logging
} * |
none
} ]
By default, IP address-specific
ICMPv6 flood attack detection is not
configured.
Содержание FlexFabric 5940 SERIES
Страница 251: ...238 ...