Configuring Attack Source Tracing; Establishing The Configuration Task; Creating An Attack Defense Policy - Huawei Quidway S3700 Series Configuration Manual

Hide thumbs Also See for Quidway S3700 Series:
Table of Contents

Advertisement

Quidway S3700 Series Ethernet Switches
Configuration Guide - Security
tcp
telnet
ttl-expired
vrrp
vrrp6
----------------------------------------------------------------------
Linkup Information:
----------------------------------------------------------------------------
Packet Name
----------------------------------------------------------------------------
bgp
----------------------------------------------------------------------------

6.4 Configuring Attack Source Tracing

The attack source tracing technology analyzes the influence of packets on the CPU and notifies
users through logs or alarms for possible attack packets.

6.4.1 Establishing the Configuration Task

This section describes how to establish the configuration task of attack source tracing.
Applicable Environment
A large number of attack packets may attack the CPUs of devices on the network. The attack
source tracing technology analyzes the influence of packets on the CPU and notifies users
through logs or alarms for possible attack packets.
Pre-configuration Tasks
Before configuring attack source tracing, complete the following task.
l
Data Preparation
To configure attack source tracing, you need the following data.
No.
1
2
3

6.4.2 Creating an Attack Defense Policy

You can create an attack defense policy by using name.
Issue 01 (2011-07-15)
Enabled
Enabled
Enabled
Disabled
Disabled
Cir(Kbps)/Cbs(Byte)
512/64000
NOTE
The S3700 do not display the Port-type field.
Connecting interfaces and setting the physical parameters of each interface to ensure that
the physical layer is in Up state
Data
Name and description of the attack defense policy
Rate for checking the received IP packets
Alarm threshold of attack source tracing
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
6 Local Attack Defense Configuration
64
10000
64
10000
64
10000
64
10000
64
10000
SIP(SMAC)
DIP(DMAC)
6.6.6.6
9.9.9.9
2
NA
3
NA
2
NA
2
NA
2
NA
Port(C/S)
53706/179
184

Advertisement

Table of Contents
loading

Table of Contents