Slot 1:
Totally 3 flood protected IP addresses.
Slot 2:
Totally 3 flood protected IP addresses.
# (Distributed devices in IRF mode.) Display the number of IPv4 addresses protected by flood attack
detection and prevention in the attack defense policy abc.
<Sysname> display attack-defense policy abc flood ip count
Slot 1 in chassis 1:
Totally 3 flood protected IP addresses.
Slot 2 in chassis 2:
Totally 3 flood protected IP addresses.
Table 156 Command output
Field
Totally 3 flood protected IP
addresses
IP address
VPN instance
Type
Rate threshold(PPS)
Dropped
display attack-defense policy ipv6
Use display attack-defense policy ipv6 to display information about IPv6 addresses protected by
flood attack detection and prevention.
Syntax
Centralized devices in standalone mode:
display attack-defense policy policy-name { ack-flood | dns-flood | fin-flood | flood | http-flood
| icmpv6-flood | rst-flood | syn-ack-flood | syn-flood | udp-flood } ipv6 [ ipv6-address [ vpn
vpn-instance-name ] ] [ count ]
Distributed devices in standalone mode/centralized devices in IRF mode:
display attack-defense policy policy-name { ack-flood | dns-flood | fin-flood | flood | http-flood
| icmpv6-flood | rst-flood | syn-ack-flood | syn-flood | udp-flood } ipv6 [ ipv6-address [ vpn
vpn-instance-name ] ] [ slot slot-number ] [ count ]
Distributed devices in IRF mode:
display attack-defense policy policy-name { ack-flood | dns-flood | fin-flood | flood | http-flood
| icmpv6-flood | rst-flood | syn-ack-flood | syn-flood | udp-flood } ipv6 [ ipv6-address [ vpn
vpn-instance-name ] ] [ chassis chassis-number slot slot-number ] [ count ]
Views
Any view
Description
Total number of the IPv4 addresses protected by flood attack detection
and prevention.
Protected IPv4 address.
MPLS L3VPN instance to which the protected IPv4 address belongs. If the
protected IPv4 address is on the public network, this field displays
hyphens (--).
Type of the flood attack.
Threshold for triggering the flood attack prevention, in units of packets
sent to the IP address per second. If no rate threshold is set, this field
displays 1000.
Number of dropped attack packets. If the prevention action is logging, this
field displays 0.
1002