Creating An Attack Defense Policy; Enabling The Automatic Attack Source Tracing - Huawei Quidway S9300 Configuration Manual

Terabit routing switch
Table of Contents

Advertisement

Quidway S9300 Terabit Routing Switch
Configuration Guide - Security
Data Preparation
To configure attack source tracing, you need the following data.
No.
1
2
3
4

6.4.2 Creating an Attack Defense Policy

Procedure
Step 1 Run:
system-view
The system view is displayed.
Step 2 Run:
cpu-defend policy policy-number
An attack defense policy is created.
Step 3 (Optional) Run:
description text
The description of the attack defense policy is set.
----End

6.4.3 Enabling the Automatic Attack Source Tracing

Context
Configurations relating to other attack source tracing features, such as checking threshold and
alarm threshold in attack source tracing, can be conducted after the automatic attack source
tracing function is enabled.
Procedure
Step 1 Run:
system-view
The system view is displayed.
Step 2 Run:
cpu-defend policy policy-number
Issue 06 (2010–01–08)
Data
Number and description of the attack defense policy
Rate checking threshold in attack source tracing
Rate alarm threshold in attack source tracing
Number of the LPU to which the attack defense policy is applied
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
6 Local Attack Defense Configuration
6-9

Advertisement

Table of Contents
loading

Table of Contents