Reference Guide

1098 | show ipv6 firewall Dell PowerConnect W-Series ArubaOS 6.2 | Reference Guide
show ipv6 firewall
show ipv6 firewall
Example
This example displays the status of all firewall configurations.
(host) #show ipv6 firewall
Global IPv6 firewall policies
-----------------------------
Policy Action Rate Slot/Port
------ ------ ---- ---------
Monitor ping attack Disabled
Monitor TCP SYN attack Disabled
Monitor IPv6 sessions attack Disabled
Deny inter user bridging Disabled
Deny all IPv6 fragments Disabled
Per-packet logging Disabled
Enforce TCP handshake before allowing data Disabled
Prohibit RST replay attack Disabled
Session Idle Timeout Disabled
Session mirror destination Disabled
Prohibit IPv6 Spoofing Disabled
Enable IPv6 Stateful Firewall Disabled
The output of this command includes the following parameters:
Parameter Description
Monitor ping attack
If enabled, the controller monitors the number of ICMP pings per
second. If this value exceeds the maximum configured rate, the
controller will register a denial of service attack.
Monitor TCP SYN attack
If enabled, the controller monitors the number of TCP SYN messages
per second. If this value exceeds the maximum configured rate, the
controller will register a denial of service attack.
Monitor IPv6 sessions attack
If enabled, the controller monitors the number of TCP session requests
per second. If this value exceeds the maximum configured rate, the
controller will register a denial of service attack sessions.
Deny inter user bridging
If enabled this setting prevents the forwarding of Layer-2 traffic between
wired or wireless users. You can configure user role policies that
prevent Layer-3 traffic between users or networks but this does not block
Layer-2 traffic.
Deny all IPv6 fragments
If enabled, all IPv6 fragments are dropped.
Per-packet logging
If active, and logging is enabled for the corresponding session rule, this
feature logs every packet.
Enforce TCP handshake before
allowing data
If enabled, this feature prevents data from passing between two clients
until the three-way TCP handshake has been performed. Enabling this
option causes mobility to fail. So, disable this option if you have mobile