HP FlexNetwork 10500 Series Security Configuration Manual page 490

Hide thumbs Also See for FlexNetwork 10500 Series:
Table of Contents

Advertisement

Step
4.
Set the global trigger
threshold for SYN-ACK
flood attack prevention.
5.
Specify global actions
against SYN-ACK flood
attacks.
6.
Configure IP
address-specific SYN-ACK
flood attack detection.
Configuring a FIN flood attack defense policy
Step
1.
Enter system view.
2.
Enter attack defense policy
view.
3.
Enable global FIN flood
attack detection.
4.
Set the global trigger
threshold for FIN flood
attack prevention.
5.
Specify global actions
against FIN flood attacks.
6.
Configure IP
address-specific FIN flood
attack detection.
Configuring an RST flood attack defense policy
Step
1.
Enter system view.
2.
Enter attack defense policy
view.
3.
Enable global RST flood
attack detection.
4.
Set the global trigger
threshold for RST flood
attack prevention.
5.
Specify global actions
against RST flood attacks.
Command
syn-ack-flood threshold
threshold-value
syn-ack-flood action { drop |
logging } *
syn-ack-flood detect { ip
ipv4-address | ipv6
ipv6-address } [ vpn-instance
vpn-instance-name ] [ threshold
threshold-value ] [ action { drop |
logging } * ]
Command
system-view
attack-defense policy
policy-name
fin-flood detect non-specific
fin-flood threshold
threshold-value
fin-flood action { drop |
logging } *
fin-flood detect { ip
ipv4-address | ipv6
ipv6-address } [ vpn-instance
vpn-instance-name ] [ threshold
threshold-value ] [ action { drop |
logging } * ]
Command
system-view
attack-defense policy
policy-name
rst-flood detect non-specific
rst-flood threshold
threshold-value
rst-flood action { drop |
logging } *
476
Remarks
The default setting is 1000.
By default, no global action is
specified for SYN-ACK flood
attacks.
By default, IP address-specific
SYN-ACK flood attack detection is
not configured.
Remarks
N/A
N/A
By default, global FIN flood attack
detection is disabled.
The default setting is 1000.
By default, no global action is
specified for FIN flood attacks.
By default, IP address-specific FIN
flood attack detection is not
configured.
Remarks
N/A
N/A
By default, global RST flood attack
detection is disabled.
The default setting is 1000.
By default, no global action is
specified for RST flood attacks.

Advertisement

Table of Contents
loading

Table of Contents