Configuring Attack Protection Functions For An Interface; Creating An Attack Protection Policy; Configuring An Attack Protection Policy - HP 6600 Security Configuration Manual

Table of Contents

Advertisement

Configuring attack protection functions for an
interface

Creating an attack protection policy

Before configuring attack protection functions for an interface, you need to create an attack protection
policy and enter its view. In attack protection policy view, you can define one or more signatures used for
attack detection and specify the corresponding protection measures.
When creating an attack protection policy, you can also specify an interface so that the interface uses
the policy exclusively.
To create an attack protection policy:
Step
1.
Enter system view.
2.
Create an attack protection
policy and enter attack
protection policy view.

Configuring an attack protection policy

In an attack protection policy, you can specify the signatures for attack detection and the corresponding
protection measures according to the security requirements of your network.
Different types of attack protection policies have different configurations, which are described below in
terms of single-packet attacks, scanning attacks, and flood attacks.
Configuring a single-packet attack protection policy
The single-packet attack protection function determines whether a packet is an attack packet mainly by
analyzing the characteristics of the packet. It is usually applied to interfaces connecting external
networks, and inspects only the inbound packets of the interfaces. If detecting an attack packet, the
device drops or forwards the packet depending on your configuration.
To configure a policy for preventing single-packet attacks:
Step
1.
Enter system view.
2.
Enter attack protection policy
view.
3.
Enable signature detection for
single-packet attacks.
Command
system-view
attack-defense policy
policy-number [ interface
interface-type interface-number ]
Command
system-view
attack-defense policy
policy-number
signature-detect { fraggle |
icmp-redirect | icmp-unreachable
| land | large-icmp |
route-record | smurf |
source-route | tcp-flag | tracert |
winnuke } enable
484
Remarks
N/A
By default, no attack protection
policy is created.
Remarks
N/A
N/A
By default, signature detection is
disabled for all kinds of
single-packet attacks.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Hsr6600

Table of Contents