434
Configuring a UDP flood attack defense policy
Step Command
Remarks
1.
Enter system view.
system-view
N/A
2.
Enter attack defense policy
view.
attack-defense policy
policy-name
N/A
3.
Enable global UDP flood
attack detection.
udp-flood
detect
non-specific
By default, global UDP flood attack
detection is disabled.
4.
Set the global trigger
threshold for UDP flood
attack prevention.
udp-flood threshold
threshold-value
The default setting is 1000.
5.
Specify global actions
against UDP flood attacks.
udp-flood action
{
drop
|
logging
} *
By default, no global action is
specified for UDP flood attacks.
6.
Configure IP
address-specific UDP flood
attack detection.
udp-flood
detect
{
ip
ipv4-address
|
ipv6
ipv6-address
} [
vpn-instance
vpn-instance-name
] [
threshold
threshold-value
] [
action
{ {
drop
|
logging
} * |
none
} ]
By default, IP address-specific UDP
flood attack detection is not
configured.
Configuring a DNS flood attack defense policy
Step Command
Remarks
1.
Enter system view.
system-view
N/A
2.
Enter attack defense policy
view.
attack-defense policy
policy-name
N/A
3.
Enable global DNS flood
attack detection.
dns-flood detect non-specific
By default, global DNS flood attack
detection is disabled.
4.
Set the global trigger
threshold for DNS flood
attack prevention.
dns-flood threshold
threshold-value
The default setting is 1000.
5.
(Optional.) Specify the
global ports to be protected
against DNS flood attacks.
dns-flood port port-list
By default, DNS flood attack
prevention protects port 53.
6.
Specify global actions
against DNS flood attacks.
dns-flood action
{
drop
|
logging
} *
By default, no global action is
specified for DNS flood attacks.
7.
Configure IP
address-specific DNS flood
attack detection.
dns-flood
detect
{
ip
ipv4-address
|
ipv6
ipv6-address
} [
vpn-instance
vpn-instance-name
] [
port
port-list
] [
threshold
threshold-value
] [
action
{ {
drop
|
logging
} * |
none
} ]
By default, IP address-specific DNS
flood attack detection is not
configured.
Configuring an HTTP flood attack defense policy
Step Command
Remarks
1.
Enter system view.
system-view
N/A
2.
Enter attack defense policy
view.
attack-defense policy
policy-name
N/A
3.
Enable global HTTP flood
attack detection.
http-flood detect non-specific
By default, global HTTP flood attack
detection is disabled.
Содержание FlexFabric 5940 SERIES
Страница 251: ...238 ...