Table 1 lists the default settings for CPU attack defense. Table 2 lists the default settings for attack source tracing. Table 3 lists the default settings for port attack defense. Table 4 lists the default settings for user-level rate limiting.
Parameter |
Default Setting |
---|---|
CPU attack defense policy |
CPU attack defense policy named default. |
Blacklist |
No blacklist |
User-defined flow |
No user-defined flow |
Type of interfaces sending packets to the CPU |
NNI |
Type of interfaces sending protocol packets to the CPU |
To check the type of interfaces sending protocol packets to the CPU, run the display cpu-defend configuration command. |
CIR value |
By default, the switch rate-limits packets based on the default rate limits in the default policy. To check the CIR value, run the display cpu-defend configuration command. |
CPCAR value for BGP, BGP4PLUS, FTP, HTTP, HTTPS, IKE, IP-CLOUD, IPSec-ESP, ISIS, OSPF, OSPFv3, SSH, Telnet, and TFTP packets used when connections are set up |
The default CPCAR values vary according to the protocol types of packets. For details, see Configuring a Rule for Sending Packets to the CPU. |
ALP |
By default, ALP is enabled on FTP, IPv6 FTP, HTTP, HTTPS, IP-CLOUD, IKE, IPSEC-ESP, SSH, TELNET, and TFTP packets and disabled on BGP, BGP4+, ISIS, OSPF, and OSPFv3 packets. |
Parameter |
Default Setting |
---|---|
Attack defense policy |
Attack defense policy named default. |
Attack source tracing function |
Enabled |
Threshold for attack source tracing |
60 pps |
Packet sampling ratio for attack source tracing |
5 |
Attack source tracing mode |
Based on source IP addresses and source MAC addresses |
Types of traced packets |
By default, the device traces sources of 8021X, ARP, DHCP, DHCPv6, ICMP, ICMPv6, IGMP, MLD, ND, TCP, TCPv6, Telnet in attack source tracing. |
Whitelist |
By default, no whitelist is configured for attack source tracing. If any of the following conditions is met, however, the switch uses the condition as the whitelist matching rule, regardless of whether attack source tracing is enabled. After attack source tracing is enabled, the switch does not perform attack source tracing for the packets matching such rules.
|
Alarm function for attack source tracing |
Disabled |
Alarm threshold for attack source tracing |
60 pps |
Punish function for attack source tracing |
Disabled |
Parameter |
Default Setting |
---|---|
Attack defense policy |
Attack defense policy named default. |
Port attack defense function |
Enabled |
Types of protocol packets to which port attack defense is applied |
By default, port attack defense is applicable to ARP Request, Unicast ARP Request packets, ARP Reply, DHCP, ICMP, IGMP, IP fragment, and ND packets. |
Rate threshold |
The rate thresholds vary according to protocol types. For details, see Setting the Rate Threshold for Port Attack Defense. |
Sampling ratio |
5 |
Aging time |
300 seconds |
Alarm function |
Disabled |
Whitelist |
By default, no whitelist is configured for port attack defense. If any of the following conditions is met, however, the switch uses the condition as the whitelist matching rule, regardless of whether port attack defense is enabled. After port attack defense is enabled, the switch does not perform port attack defense for the packets matching such rules.
|
Parameter |
Default Setting |
---|---|
User-level rate limiting function |
Enabled |
Packet types to which the user-level rate limiting applies |
By default, the user-level rate limiting can apply to ARP Request, ARP Reply, ND, DHCP Request, DHCPv6 Request, and 8021x packets, but does not apply to IGMP and HTTPS-SYN packets. |
User-level rate limit |
10 pps |
User-level rate limiting on interface |
Enabled |