A DecoySensor identifies scanning behavior on an intranet, and lures suspicious traffic to a Decoy. The Decoy provides in-depth interaction services to further determine whether suspicious traffic is an attack.
The system view is displayed.
The deception view is created and displayed.
An IP address is configured for the Decoy.
The strict deception mode is enabled.
By default, the strict deception mode is disabled.
The IP address scanning threshold is configured.
By default, the IP address scanning threshold is 10 times per 10 seconds.
The TCP port scanning threshold is configured.
By default, the TCP port scanning threshold is 100 times per second.
The deception whitelist is configured.
By default, no deception whitelist is configured on the switch.
The frequency of scanning IP addresses by the switch is configured.
By default, the switch scans IP addresses 30 times per second.
The interval at which the switch sends an ARP broadcast packet is configured.
By default, the switch sends an ARP broadcast packet at an interval of 290 seconds.
The domain name scan threshold is configured.
By default, the domain name scan threshold is 5 scans per second.
The unknown-domain-name deception function is enabled.
By default, the unknown-domain-name deception function is disabled.
An ACI suffix is configured.
By default, the ACI suffix is aci.
The aging time of ACI entries is configured.
By default, the aging time of ACI entries is 60s. When a new DNS reply packet arrives, the corresponding ACI entry is updated.
The policy used in the case of a full ACI table to deceive is configured.
By default, the policy used in the case of a full ACI table is permit.
The Access Control Isolation (ACI) deception function is enabled.
By default, the ACI deception function is disabled.
The deception function is enabled.
By default, the deception function is disabled.