The display auto-defend configuration command displays the attack source tracing configuration.
Parameter |
Description |
Value |
---|---|---|
cpu-defend policy policy-name |
Displays the attack source tracing configuration of a specified attack defense policy.
|
The value is a string of 1 to 31 case-sensitive characters without spaces. |
After attack source tracing is configured in an attack defense policy, you can run the display auto-defend configuration command to view the attack source tracing configuration.
# Display the attack source tracing configuration.
<HUAWEI> display auto-defend configuration ---------------------------------------------------------------------------- Name : test Related slot : <0> auto-defend : enable auto-defend attack-packet sample : 5 auto-defend threshold : 60 (pps) auto-defend alarm : enable auto-defend trace-type : source-mac source-ip auto-defend protocol : arp icmp dhcp igmp tcp telnet 8021x nd dhcpv6 mld icmpv6 tcpv6 auto-defend action : deny (Expired time : 300 s) auto-defend whitelist 1 : acl number 2002 ----------------------------------------------------------------------------
The preceding information is an example. The displayed information depends on the actual situation.
Item |
Description |
---|---|
Name |
Name of an attack defense policy. |
Related slot |
ID of the stack to which the attack defense policy is applied. |
auto-defend |
Whether attack source tracing is enabled. To enable attack source tracing, run the auto-defend enable command. |
auto-defend attack-packet sample |
Packet sampling ratio for attack source tracing. To set the packet sampling ratio for attack source tracing, run the auto-defend attack-packet sample command. |
auto-defend threshold |
Checking threshold for attack source tracing. To set the checking threshold for attack source tracing, run the auto-defend threshold command. |
auto-defend alarm |
Whether the alarm function for attack source tracing is enabled. To enable the alarm function for attack source tracing, run the auto-defend alarm enable command. |
auto-defend trace-type |
Attack source tracing mode:
|
auto-defend protocol |
Type of traced packets. To specify the types of protocol packets that the device monitors in attack source tracing, run the auto-defend protocol command. |
auto-defend action |
Action taken on the attack source. The value can be:
|
auto-defend whitelist 1 |
Whitelist for attack source tracing. For related commands, see auto-defend whitelist. |