HP VPN Firewall Appliances Attack Protection Command Reference
i
Contents
Attack detection and protection commands ··············································································································· 1
attack-defense apply policy ····································································································································· 1
attack-defense logging enable ································································································································ 1
attack-defense policy ················································································································································ 2
blacklist enable ························································································································································· 2
blacklist ip ································································································································································· 3
defense dns-flood enable ········································································································································· 4
defense dns-flood ip ················································································································································· 5
defense dns-flood rate-threshold ····························································································································· 6
defense icmp-flood action drop-packet ·················································································································· 7
defense icmp-flood enable ······································································································································ 7
defense icmp-flood ip ··············································································································································· 8
defense icmp-flood rate-threshold ··························································································································· 9
defense scan add-to-blacklist ································································································································ 10
defense scan blacklist-timeout ······························································································································ 11
defense scan enable ············································································································································· 12
defense scan max-rate ·········································································································································· 12
defense syn-flood action ······································································································································· 13
defense syn-flood enable ······································································································································ 14
defense syn-flood ip ·············································································································································· 14
defense syn-flood rate-threshold ··························································································································· 15
defense udp-flood action drop-packet ················································································································· 16
defense udp-flood enable ····································································································································· 17
defense udp-flood ip ············································································································································· 18
defense udp-flood rate-threshold ·························································································································· 19
display attack-defense policy ······························································································································· 20
display attack-defense statistics zone ·················································································································· 23
display blacklist ····················································································································································· 26
display flow-statistics statistics ······························································································································ 27
display flow-statistics statistics zone ···················································································································· 29
display tcp-proxy protected-ip ······························································································································ 30
flow-statistics enable ·············································································································································· 31
reset attack-defense statistics zone ······················································································································ 32
signature-detect ······················································································································································ 33
signature-detect action drop-packet ····················································································································· 34
signature-detect large-icmp max-length ··············································································································· 34
tcp-proxy enable ···················································································································································· 35
tcp-proxy mode ······················································································································································ 36
tcp-proxy protected-ip ··········································································································································· 36
ARP attack protection commands ····························································································································· 38
IP flood protection configuration commands ··············································································································· 38
arp resolving-route enable ···································································································································· 38
arp source-suppression enable ···························································································································· 38
arp source-suppression limit ································································································································· 39
display arp source-suppression ···························································································································· 39
Source MAC-based ARP attack detection configuration commands ········································································ 40
arp anti-attack source-mac ···································································································································· 41
arp anti-attack source-mac aging-time ················································································································ 41