F3726, F3211, F3174, R5135, R3816-HP Firewalls and UTM Devices Attack Protection Command Reference-6PW100

54
TCP attack protection configuration commands
display tcp status
Use display tcp status to display status of all TCP connections for monitoring TCP connections.
Syntax
display tcp status [ | { begin | exclude | include } regular-expression ]
Views
Any view
Default command level
1: Monitor level
Parameters
|: Filters command output by specifying a regular expression. For more information about regular
expressions, see Getting Started Guide.
begin: Displays the first line that matches the specified regular expression and all lines that follow.
exclude: Displays all lines that do not match the specified regular expression.
include: Displays all lines that match the specified regular expression.
regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.
Examples
# Display status of all TCP connections.
<Sysname> display tcp status
*: TCP MD5 Connection
TCPCB Local Add:port Foreign Add:port State
03e37dc4 0.0.0.0:4001 0.0.0.0:0 Listening
04217174 100.0.0.204:23 100.0.0.253:65508 Established
Table 9 Command output
Field Descri
tion
*: TCP MD5 Connection
If the status information about a TCP connection contains an asterisk (*), the TCP
adopts the MD5 algorithm for authentication.
TCPCB TCP control block.
Local Add:port Local IP address and port number.
Foreign Add:port Remote IP address and port number.
State State of the TCP connection.
tcp anti-naptha enable
Use tcp anti-naptha enable to enable the protection against Naptha attack.