HP FlexNetwork 10500 Series Security Configuration Manual page 491

Hide thumbs Also See for FlexNetwork 10500 Series:
Table of Contents

Advertisement

Step
6.
Configure IP
address-specific RST flood
attack detection.
Configuring an ICMP flood attack defense policy
Step
1.
Enter system view.
2.
Enter attack defense policy
view.
3.
Enable global ICMP flood
attack detection.
4.
Set the global trigger
threshold for ICMP flood
attack prevention.
5.
Specify global actions
against ICMP flood attacks.
6.
Configure IP
address-specific ICMP
flood attack detection.
Configuring an ICMPv6 flood attack defense policy
Step
1.
Enter system view.
2.
Enter attack defense policy
view.
3.
Enable global ICMPv6
flood attack detection.
4.
Set the global trigger
threshold for ICMPv6 flood
attack prevention.
5.
Specify global actions
against ICMPv6 flood
attacks.
6.
Configure IP
address-specific ICMPv6
flood attack detection.
Configuring a UDP flood attack defense policy
Step
1.
Enter system view.
Command
rst-flood detect { ip
ipv4-address | ipv6
ipv6-address } [ vpn-instance
vpn-instance-name ] [ threshold
threshold-value ] [ action { drop |
logging } * ]
Command
system-view
attack-defense policy
policy-name
icmp-flood detect non-specific
icmp-flood threshold
threshold-value
icmp-flood action { drop |
logging } *
icmp-flood detect ip ip-address
[ vpn-instance
vpn-instance-name ] [ threshold
threshold-value ] [ action { drop |
logging } * ]
Command
system-view
attack-defense policy
policy-name
icmpv6-flood detect
non-specific
icmpv6-flood threshold
threshold-value
icmpv6-flood action { drop |
logging } *
icmpv6-flood detect ipv6
ipv6-address [ vpn-instance
vpn-instance-name ] [ threshold
threshold-value ] [ action { drop |
logging } * ]
Command
system-view
477
Remarks
By default, IP address-specific RST
flood attack detection is not
configured.
Remarks
N/A
N/A
By default, global ICMP flood attack
detection is disabled.
The default setting is 1000.
By default, no global action is
specified for ICMP flood attacks.
By default, IP address-specific
ICMP flood attack detection is not
configured.
Remarks
N/A
N/A
By default, global ICMPv6 flood
attack detection is disabled.
The default setting is 1000.
By default, no global action is
specified for ICMPv6 flood attacks.
By default, IP address-specific
ICMPv6 flood attack detection is not
configured.
Remarks
N/A

Advertisement

Table of Contents
loading

Table of Contents