F3726, F3211, F3174, R5135, R3816-HP Firewalls and UTM Devices Attack Protection Command Reference-6PW100

34
Syntax
signature-detect action drop-packet
undo signature-detect action
Default
The device only outputs alarm logs if it detects a single-packet attack.
Views
Attack protection policy view
Default command level
2: System level
Examples
# Configure attack protection policy 1 to drop single-packet attack packets.
<Sysname> system-view
[Sysname] attack-defense policy 1
[Sysname-attack-defense-policy-1] signature-detect action drop-packet
Related commands
display attack-defense policy
signature-detect large-icmp max-length
Use signature-detect large-icmp max-length to specify the ICMP packet length threshold that triggers
large ICMP attack protection.
Use undo signature-detect large-icmp max-length to restore the default.
Syntax
signature-detect large-icmp max-length length
undo signature-detect large-icmp max-length
Default
An ICMP packet length of 4000 bytes triggers large ICMP attack protection.
Views
Attack protection policy view
Default command level
2: System level
Parameters
length: Maximum length of an ICMP packet, in the range of 28 to 65534 bytes.
Usage guidelines
With signature detection of large ICMP attack enabled, a device considers all ICMP packets longer than
the specified maximum length as large ICMP attack packets.
This command is effective only when signature detection of large ICMP attack is enabled.