Configurable Options; Display Options; Traps And Logs - Juniper SYSTEM BASICS - CONFIGURATION GUIDE V 11.1.X Configuration Manual

System basics configuration guide software for e series broadband services routers
Table of Contents

Advertisement

DoS attacks. Group membership is based on physical port and control protocol; all
flows in that group are considered suspicious.

Configurable Options

You can configure the following options for suspicious flow detection:
You can also clear the following:

Display Options

For monitoring purposes, you can:

Traps and Logs

The system generates a trap and a log message under the following conditions:
Global on or off. When the option is set to off, flows or packets are not marked
as suspicious. The default is on.
Actions a line module takes when the suspicious flow table on the line module
overflows:
Overflow Stop recognizing new suspicious flows
Group Group flows into logical groupings where some individual flows are
monitored as a group
Suspicious threshold for each protocol. The threshold is the rate in packets per
second at which a flow becomes suspicious. A zero setting disables suspicious
flow detection for the protocol. Flows are subject to protocol and priority rate
limits, but not to suspicious flow detection.
Low threshold for each protocol. The threshold rate determines whether an
interface transitions from suspicious back to nonsuspicious. A zero setting means
that the flow does not transition back to nonsuspicious based on packet rate.
Backoff time in seconds for each protocol. After this period expires, the flow
transitions to nonsuspicious regardless of the current rate. When set to zero, an
interface does not return to the nonsuspicious state using a time mechanism.
All suspicious flows from the suspicious flow table for a specific slot.
Suspicious flows from the suspicious flow table for the entire system.
A single suspicious flow; returns the flow to the nonsuspicious state.
Display all suspicious control flows when the system has recognized an attack.
Display the current state and the number of transitions into suspicious state for
the protocol and priority.
Display historical counts about the number of flows made suspicious.
View a trap or log generated when a control flow is considered suspicious.
View a trap or log generated when a control flow is no longer suspicious.
Chapter 7: Passwords and Security
Denial of Service (DoS) Protection
453

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the SYSTEM BASICS - CONFIGURATION GUIDE V 11.1.X and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

This manual is also suitable for:

Junose 11.1

Table of Contents