HP MSR Series Configuration Manual page 509

Hpe flexnetwork msr router series
Hide thumbs Also See for MSR Series:
Table of Contents

Advertisement

Step
4.
Set the global trigger
threshold for RST flood
attack prevention.
5.
Specify global actions
against RST flood attacks.
6.
Configure IP-specific RST
flood attack detection.
Configuring an ICMP flood attack defense policy
Step
1.
Enter system view.
2.
Enter attack defense policy
view.
3.
Enable ICMP flood attack
detection for non-specific IP
addresses.
4.
Set the global trigger
threshold for ICMP flood
attack prevention.
5.
Specify global actions
against ICMP flood attacks.
6.
Configure IP-specific ICMP
flood attack detection.
Configuring an ICMPv6 flood attack defense policy
Step
1.
Enter system view.
2.
Enter attack defense policy
view.
3.
Enable ICMPv6 flood attack
detection for non-specific
IPv6 addresses.
4.
Set the global trigger
threshold for ICMPv6 flood
attack prevention.
5.
Specify global actions
against ICMPv6 flood
attacks.
Command
rst-flood threshold
threshold-value
rst-flood action { client-verify |
drop | logging } *
rst-flood detect { ip ip-address |
ipv6 ipv6-address }
[ vpn-instance
vpn-instance-name ] [ threshold
threshold-value ] [ action
{ { client-verify | drop | logging }
* | none } ]
Command
system-view
attack-defense policy
policy-name
icmp-flood detect non-specific
icmp-flood threshold
threshold-value
icmp-flood action { drop |
logging } *
icmp-flood detect ip ip-address
[ vpn-instance
vpn-instance-name ] [ threshold
threshold-value ] [ action { { drop
| logging } * | none } ]
Command
system-view
attack-defense policy
policy-name
icmpv6-flood detect
non-specific
icmpv6-flood threshold
threshold-value
icmpv6-flood action { drop |
logging } *
494
Remarks
By default, the global trigger
threshold is 1000 for RST flood
attack prevention.
By default, no global action is
specified for RST flood attacks.
By default, RST flood attack
detection is not configured for any
IP address.
Remarks
N/A
N/A
By default, ICMP flood attack
detection is disabled for
non-specific IP addresses.
By default, the global trigger
threshold is 1000 for ICMP flood
attack prevention.
By default, no global action is
specified for ICMP flood attacks.
By default, ICMP flood attack
detection is not configured for any
IP address.
Remarks
N/A
N/A
By default, ICMPv6 flood attack
detection is disabled for
non-specific IPv6 addresses.
By default, the global trigger
threshold is 1000 for ICMPv6 flood
attack prevention.
By default, no global action is
specified for ICMPv6 flood attacks.

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents