< Home

display auto-defend configuration

Function

The display auto-defend configuration command displays the attack source tracing configuration.

Format

display auto-defend configuration [ cpu-defend policy policy-name ]

Parameters

Parameter

Description

Value

cpu-defend policy policy-name

Displays the attack source tracing configuration of a specified attack defense policy.

  • If this parameter is specified, the configuration of the specified attack defense policy is displayed.
  • If this parameter is not specified, the configurations of all attack defense policies are displayed.

The value is a string of 1 to 31 case-sensitive characters without spaces.

Views

All views

Default Level

1: Monitoring level

Usage Guidelines

After attack source tracing is configured in an attack defense policy, you can run the display auto-defend configuration command to view the attack source tracing configuration.

Example

# Display the attack source tracing configuration.

<HUAWEI> display auto-defend configuration
 ----------------------------------------------------------------------------
 Name  : test
 Related slot : <0>
 auto-defend                      : enable
 auto-defend attack-packet sample : 5
 auto-defend threshold            : 60 (pps)
 auto-defend alarm                : enable
 auto-defend trace-type           : source-mac source-ip
 auto-defend protocol             : arp icmp dhcp igmp tcp telnet 8021x nd dhcpv6 mld icmpv6 tcpv6
 auto-defend action               : deny (Expired time : 300 s)
 auto-defend whitelist 1          : acl number 2002
 ----------------------------------------------------------------------------

The preceding information is an example. The displayed information depends on the actual situation.

Table 1 Description of the display auto-defend configuration command output

Item

Description

Name

Name of an attack defense policy.

Related slot

ID of the stack to which the attack defense policy is applied.

auto-defend

Whether attack source tracing is enabled. To enable attack source tracing, run the auto-defend enable command.

auto-defend attack-packet sample

Packet sampling ratio for attack source tracing. To set the packet sampling ratio for attack source tracing, run the auto-defend attack-packet sample command.

auto-defend threshold

Checking threshold for attack source tracing. To set the checking threshold for attack source tracing, run the auto-defend threshold command.

auto-defend alarm

Whether the alarm function for attack source tracing is enabled. To enable the alarm function for attack source tracing, run the auto-defend alarm enable command.

auto-defend trace-type

Attack source tracing mode:
  • source-mac: indicates attack source tracing based on source MAC addresses.
  • source-ip: indicates attack source tracing based on source IP addresses.
  • source-portvlan: indicates attack source tracing based on source ports+VLANs.
To configure the attack source tracing mode, run the auto-defend trace-type command.

auto-defend protocol

Type of traced packets. To specify the types of protocol packets that the device monitors in attack source tracing, run the auto-defend protocol command.

auto-defend action

Action taken on the attack source. The value can be:
  • deny (Expired time: 300s): indicates that the device discards all attack packets in 300s.
  • error-down: indicates that the inbound interfaces of attack packets are shut down.
To configure the punish action, run the auto-defend action command.

auto-defend whitelist 1

Whitelist for attack source tracing. For related commands, see auto-defend whitelist.

Copyright © Huawei Technologies Co., Ltd.
Copyright © Huawei Technologies Co., Ltd.
< Previous topic Next topic >