HP MSR Series Configuration Manual page 508

Hpe flexnetwork msr router series
Hide thumbs Also See for MSR Series:
Table of Contents

Advertisement

Step
2.
Enter attack defense policy
view.
3.
Enable SYN-ACK flood
attack detection for
non-specific IP addresses.
4.
Set the global trigger
threshold for SYN-ACK
flood attack prevention.
5.
Specify global actions
against SYN-ACK flood
attacks.
6.
Configure IP-specific
SYN-ACK flood attack
detection.
Configuring a FIN flood attack defense policy
Step
1.
Enter system view.
2.
Enter attack defense policy
view.
3.
Enable FIN flood attack
detection for non-specific IP
addresses.
4.
Set the global trigger
threshold for FIN flood
attack prevention.
5.
Specify global actions
against FIN flood attacks.
6.
Configure IP-specific FIN
flood attack detection.
Configuring an RST flood attack defense policy
Step
1.
Enter system view.
2.
Enter attack defense policy
view.
3.
Enable RST flood attack
detection for non-specific IP
addresses.
Command
attack-defense policy
policy-name
syn-ack-flood detect
non-specific
syn-ack-flood threshold
threshold-value
syn-ack-flood action
{ client-verify | drop | logging } *
syn-ack-flood detect { ip
ip-address | ipv6 ipv6-address }
[ vpn-instance
vpn-instance-name ] [ threshold
threshold-value ] [ action
{ { client-verify | drop | logging }
* | none } ]
Command
system-view
attack-defense policy
policy-name
fin-flood detect non-specific
fin-flood threshold
threshold-value
fin-flood action { client-verify |
drop | logging } *
fin-flood detect { ip ip-address |
ipv6 ipv6-address }
[ vpn-instance
vpn-instance-name ] [ threshold
threshold-value ] [ action
{ { client-verify | drop | logging }
* | none } ]
Command
system-view
attack-defense policy
policy-name
rst-flood detect non-specific
493
Remarks
N/A
By default, SYN-ACK flood attack
detection is disabled for
non-specific IP addresses.
By default, the global trigger
threshold is 1000 for SYN-ACK
flood attack prevention.
By default, no global action is
specified for SYN-ACK flood
attacks.
By default, SYN-ACK flood attack
detection is not configured for any
IP address.
Remarks
N/A
N/A
By default, FIN flood attack
detection is disabled for
non-specific IP addresses.
By default, the global trigger
threshold is 1000 for FIN flood
attack prevention.
By default, no global action is
specified for FIN flood attacks.
By default, FIN flood attack
detection is not configured for any
IP address.
Remarks
N/A
N/A
By default, RST flood attack
detection is disabled for
non-specific IP addresses.

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents