Display Attack-Defense Policy Ipv6 - H3C MSR Series Command Reference Manual

Comware 7 security
Hide thumbs Also See for MSR Series:
Table of Contents

Advertisement

Slot 1:
Totally 3 flood protected IP addresses.
Slot 2:
Totally 3 flood protected IP addresses.
# (Distributed devices in IRF mode.) Display the number of IPv4 addresses protected by flood attack
detection and prevention in the attack defense policy abc.
<Sysname> display attack-defense policy abc flood ip count
Slot 1 in chassis 1:
Totally 3 flood protected IP addresses.
Slot 2 in chassis 2:
Totally 3 flood protected IP addresses.
Table 156 Command output
Field
Totally 3 flood protected IP
addresses
IP address
VPN instance
Type
Rate threshold(PPS)
Dropped

display attack-defense policy ipv6

Use display attack-defense policy ipv6 to display information about IPv6 addresses protected by
flood attack detection and prevention.
Syntax
Centralized devices in standalone mode:
display attack-defense policy policy-name { ack-flood | dns-flood | fin-flood | flood | http-flood
| icmpv6-flood | rst-flood | syn-ack-flood | syn-flood | udp-flood } ipv6 [ ipv6-address [ vpn
vpn-instance-name ] ] [ count ]
Distributed devices in standalone mode/centralized devices in IRF mode:
display attack-defense policy policy-name { ack-flood | dns-flood | fin-flood | flood | http-flood
| icmpv6-flood | rst-flood | syn-ack-flood | syn-flood | udp-flood } ipv6 [ ipv6-address [ vpn
vpn-instance-name ] ] [ slot slot-number ] [ count ]
Distributed devices in IRF mode:
display attack-defense policy policy-name { ack-flood | dns-flood | fin-flood | flood | http-flood
| icmpv6-flood | rst-flood | syn-ack-flood | syn-flood | udp-flood } ipv6 [ ipv6-address [ vpn
vpn-instance-name ] ] [ chassis chassis-number slot slot-number ] [ count ]
Views
Any view
Description
Total number of the IPv4 addresses protected by flood attack detection
and prevention.
Protected IPv4 address.
MPLS L3VPN instance to which the protected IPv4 address belongs. If the
protected IPv4 address is on the public network, this field displays
hyphens (--).
Type of the flood attack.
Threshold for triggering the flood attack prevention, in units of packets
sent to the IP address per second. If no rate threshold is set, this field
displays 1000.
Number of dropped attack packets. If the prevention action is logging, this
field displays 0.
1002

Advertisement

Table of Contents
loading

Table of Contents