F3726, F3211, F3174, R5135, R3816-HP Firewalls and UTM Devices Attack Protection Command Reference-6PW100

i
Contents
Attack detection and protection configuration commands ························································································ 1
attack-defense apply policy ····································································································································· 1
attack-defense logging enable ································································································································ 1
attack-defense policy ················································································································································ 2
blacklist enable ························································································································································· 3
blacklist ip ································································································································································· 3
defense dns-flood enable ········································································································································· 4
defense dns-flood ip ················································································································································· 5
defense dns-flood rate-threshold ····························································································································· 6
defense icmp-flood action drop-packet ·················································································································· 7
defense icmp-flood enable ······································································································································ 7
defense icmp-flood ip ··············································································································································· 8
defense icmp-flood rate-threshold ··························································································································· 9
defense scan add-to-blacklist ································································································································ 10
defense scan blacklist-timeout ······························································································································ 11
defense scan enable ············································································································································· 12
defense scan max-rate ·········································································································································· 12
defense syn-flood action ······································································································································· 13
defense syn-flood enable ······································································································································ 14
defense syn-flood ip ·············································································································································· 14
defense syn-flood rate-threshold ··························································································································· 15
defense udp-flood action drop-packet ················································································································· 16
defense udp-flood enable ····································································································································· 17
defense udp-flood ip ············································································································································· 18
defense udp-flood rate-threshold ·························································································································· 19
display attack-defense policy ······························································································································· 20
display attack-defense statistics zone ·················································································································· 23
display blacklist ····················································································································································· 26
display flow-statistics statistics ······························································································································ 27
display flow-statistics statistics zone ···················································································································· 29
display tcp-proxy protected-ip ······························································································································ 30
flow-statistics enable ·············································································································································· 31
reset attack-defense statistics zone ······················································································································ 32
signature-detect ······················································································································································ 33
signature-detect action drop-packet ····················································································································· 33
signature-detect large-icmp max-length ··············································································································· 34
tcp-proxy enable ···················································································································································· 35
tcp-proxy mode ······················································································································································ 36
tcp-proxy protected-ip ··········································································································································· 36
ARP attack protection configuration commands ······································································································ 38
IP flood protection configuration commands ··············································································································· 38
arp resolving-route enable ···································································································································· 38
arp source-suppression enable ···························································································································· 38
arp source-suppression limit ································································································································· 39
display arp source-suppression ···························································································································· 39
Source MAC based ARP attack detection configuration commands ········································································ 40
arp anti-attack source-mac ···································································································································· 41
arp anti-attack source-mac aging-time ················································································································ 41