Download Print this page

Display Attack-Defense Scan Victim Ipv6 - HP FlexNetwork MSR Series Command Reference Manual

Comware 7 security
Hide thumbs Also See for FlexNetwork MSR Series:

Advertisement

Table 130 Command output
Field
Totally 3 victim IP addresses
IP address
VPN instance
Protocol
Detected on
Duration(min)
Related commands
display attack-defense scan attacker ip
scan detect

display attack-defense scan victim ipv6

Use display attack-defense scan victim ipv6 to display information about IPv6 scanning attack
victims.
Syntax
Centralized devices in standalone mode:
display attack-defense scan victim ipv6 [ interface interface-type interface-number | local ]
[ count ]
Distributed devices in standalone mode/centralized devices in IRF mode:
display attack-defense scan victim ipv6 [ [ interface interface-type interface-number | local ]
[ slot slot-number ] ] [ count ]
Distributed devices in IRF mode:
display attack-defense scan victim ipv6 [ [ interface interface-type interface-number | local ]
[ chassis chassis-number slot slot-number ] ] [ count ]
Views
Any view
Predefined user roles
network-admin
network-operator
Parameters
interface interface-type interface-number: Specifies an interface by its type and number.
local: Specifies the device.
slot slot-number: Specifies a card by its slot number. This option is available only when you specify
the device or a global interface, such as a VLAN interface or tunnel interface. If you do not specify a
card, this command displays information about IPv6 scanning attack victims for all cards.
(Distributed devices in standalone mode.)
slot slot-number: Specifies an IRF member device by its member ID. This option is available only
when you specify the device or a global interface, such as a VLAN interface or tunnel interface. If you
Description
Total number of IPv4 scanning attack victims.
IPv4 address of the victim.
MPLS L3VPN instance to which the victim IPv4 address belongs. If the
victim IPv4 address is on the public network, this field displays hyphens
(--).
Name of the protocol.
Where the attack is detected, on the device (Local) or an interface.
The amount of time the attack lasts, in minutes.
847

Advertisement

loading