R3303-HP HSR6800 Routers Security Command Reference

446
[Sysname] attack-defense policy 1
[Sysname-attack-defense-policy-1] defense scan enable
# Set the connection rate threshold for triggering scanning attack protection to 2000 connections per
second.
[Sysname-attack-defense-policy-1] defense scan max-rate 2000
Related commands
blacklist enable
defense scan add-to-blacklist
defense scan blacklist-timeout
defense scan enable
defense syn-flood action
Use defense syn-flood action to specify the actions to be taken in response to SYN flood attack packets.
Use undo defense syn-flood action to restore the default.
Syntax
defense syn-flood action { drop-packet | trigger-tcp-proxy }
undo defense syn-flood action
Default
The device does not process the attack packets when it detects a SYN flood attack.
Views
Attack protection policy view
Default command level
2: System level
Parameters
drop-packet: Drops all subsequence connection requests to the attacked IP address.
trigger-tcp-proxy: Adds a protected IP address entry for the attacked IP address and triggers the TCP
proxy function.
Examples
# Configure the SYN flood protection policy to drop SYN flood attack packets.
<Sysname> system-view
[Sysname] attack-defense policy 1
[Sysname-attack-defense-policy-1] defense syn-flood action drop-packet
Related commands
tcp-proxy enable
defense syn-flood enable
display attack-defense policy