How To Reinstate The System Defaults For All Attack Types - Cisco SCE 8000 10GBE Software Configuration Manual

Table of Contents

Advertisement

Configuring Attack Detectors

How to Reinstate the System Defaults for All Attack Types

From the SCE(config if)# prompt, type:
Command
default attack-detector default
Specific Attack Detectors
Use these commands to define thresholds, actions, subscriber notification setting, and sending an SNMP
trap for a specific attack detector for selected set of attack types.
Options
A specific attack detector may be configured for each possible combination of protocol, attack direction,
and side. The Cisco SCE platform supports a maximum of 100 attack detectors. Each attack detector is
identified by a number (1-100). Each detector can be either disabled (default) or enabled. An enabled
attack detector must be configured with the following parameters:
Cisco SCE 8000 10GBE Software Configuration Guide
12-14
Options, page 12-14
How to Enable a Specific Attack Detector and Assign it an ACL, page 12-15
How to Define the Action and Optionally the Thresholds for a Specific Attack Detector, page 12-16
How to Define the Subscriber Notification Setting for a Specific Attack Detector, page 12-16
How to Define the SNMP Trap Setting for a Specific Attack Detector, page 12-16
How to Define the List of Destination Ports for TCP or UDP Protocols for a Specific Attack
Detector, page 12-17
How to Delete User-Defined Values, page 12-17
How to Disable a Specific Attack Detector, page 12-17
How to Disable All Non-default Attack Detectors, page 12-18
How to Disable All Attack Detectors, page 12-18
access-list—The number of the Access-Control List (ACL) associated with the specified attack
detector. The ACL identifies the IP addresses selected by this detector. (See
Control Lists (ACLs)" section on page
For dual-ip detections, the destination IP address is used for matching with the ACL.
Use the "none" keyword to indicate that all IP addresses are permitted by this attack-detector.
This option is useful when using the command to define a port list, and the desired configuration
should be set for all IP addresses.
comment—For documentation purposes.
Chapter 12
Identifying and Preventing Distributed Denial-of-Service Attacks
Purpose
Reinstates the system defaults for the defined
attack types.
5-32.)
"Configuring Access
OL-30621-02

Advertisement

Table of Contents
loading

Table of Contents