< Home

SECE/4/PORT_ATTACK

Message

SECE/4/PORT_ATTACK: Port attack occurred. (Slot=[STRING], SourceAttackInterface=[STRING], OuterVlan/InnerVlan=[ULONG]/[ULONG], AttackProtocol=[STRING], AttackPackets=[ULONG] packets per second)

Description

A lot of attack packets from the corresponding VLAN are received on the interface.

Parameters

Parameter Name Parameter Meaning

Slot

  • Indicates the slot ID if stacking is not configured.
  • Indicates the stack ID if stacking is configured.

SourceAttackInterface

Indicates the interface that initiates the attack.

OuterVlan

Indicates the outer VLAN ID or single VLAN ID of the attack source.

InnerVlan

Indicates the inner VLAN ID of the attack source.

AttackProtocol

Indicates the protocol type of attack packets.

AttackPackets

Indicates the rate of attack packets, in pps.

Possible Causes

A lot of attack packets from the corresponding VLAN are received on the interface.

Procedure

  1. Run the display auto-defend attack-source command to check whether attack packets exist on the interfaces.
  2. Analyze the features of attack packets, configure the traffic policy according to this information to perform CAR on the packets, and then apply this policy to the device where the attack occurred.
  3. Collect log information and configuration information, and then contact technical support personnel. You can collect diagnostic information using the display diagnostic-information command.
Copyright © Huawei Technologies Co., Ltd.
Copyright © Huawei Technologies Co., Ltd.
< Previous topic Next topic >