Attack Detection And Prevention Configuration Task List; Configuring An Attack Defense Policy; Creating An Attack Defense Policy; Configuring A Single-Packet Attack Defense Policy - HP FlexNetwork 10500 Series Security Configuration Manual

Hide thumbs Also See for FlexNetwork 10500 Series:
Table of Contents

Advertisement

Attack detection and prevention configuration task
list
Tasks at a glance
(Required.)
(Required.)
(Required.) Perform at least one of the following tasks to configure attack detection:

Configuring a single-packet attack defense policy

Configuring a scanning attack defense policy
Configuring a flood attack defense policy
(Optional.)
(Required.) Perform at least one of the tasks to apply an attack defense policy:
Applying an attack defense policy to an interface
Applying an attack defense policy to the device
(Optional.)
(Optional.)
(Optional.)
(Optional.)
(Optional.)

Configuring an attack defense policy

Creating an attack defense policy

An attack defense policy can contain a set of attack detection and prevention configuration against
multiple attacks.
To create an attack defense policy:
Step
1.
Enter system view.
2.
Create an attack defense
policy and enter its view.
Configuring a single-packet attack defense policy
Apply the single-packet attack defense policy to the interface that is connected to the external
network.
Single-packet attack detection inspects incoming packets based on the packet signature. If an attack
packet is detected, the device can take the following actions:
Output logs (the default action).
Drop attack packets.
You can also configure the device to not take any actions.
Configuring an attack defense
Creating an attack defense policy
Configuring attack detection exemption
Enabling log non-aggregation for single-packet attack events
Configuring TCP fragment attack prevention
Configuring the IP blacklist feature
Configuring login attack prevention
Enabling the login delay
policy:
Command
system-view
attack-defense policy
policy-name
472
Remarks
N/A
By default, no attack defense policy
exists.

Advertisement

Table of Contents
loading

Table of Contents