The display auto-defend configuration command displays the attack source tracing configuration.
Parameter  | 
Description  | 
Value  | 
|---|---|---|
cpu-defend policy policy-name  | 
Displays the attack source tracing configuration of a specified attack defense policy. 
  | 
The value is a string of 1 to 31 case-sensitive characters without spaces.  | 
After attack source tracing is configured in an attack defense policy, you can run the display auto-defend configuration command to view the attack source tracing configuration.
# Display the attack source tracing configuration.
<HUAWEI> display auto-defend configuration ---------------------------------------------------------------------------- Name : test Related slot : <0> auto-defend : enable auto-defend attack-packet sample : 5 auto-defend threshold : 60 (pps) auto-defend alarm : enable auto-defend trace-type : source-mac source-ip auto-defend protocol : arp icmp dhcp igmp tcp telnet 8021x nd dhcpv6 mld icmpv6 tcpv6 auto-defend action : deny (Expired time : 300 s) auto-defend whitelist 1 : acl number 2002 ----------------------------------------------------------------------------
 The preceding information is an example. The displayed information depends on the actual situation.
Item  | 
Description  | 
|---|---|
Name  | 
Name of an attack defense policy.  | 
Related slot  | 
ID of the stack to which the attack defense policy is applied.  | 
auto-defend  | 
Whether attack source tracing is enabled. To enable attack source tracing, run the auto-defend enable command.  | 
auto-defend attack-packet sample  | 
Packet sampling ratio for attack source tracing. To set the packet sampling ratio for attack source tracing, run the auto-defend attack-packet sample command.  | 
auto-defend threshold  | 
Checking threshold for attack source tracing. To set the checking threshold for attack source tracing, run the auto-defend threshold command.  | 
auto-defend alarm  | 
Whether the alarm function for attack source tracing is enabled. To enable the alarm function for attack source tracing, run the auto-defend alarm enable command.  | 
auto-defend trace-type  | 
Attack source tracing mode: 
  | 
auto-defend protocol  | 
Type of traced packets. To specify the types of protocol packets that the device monitors in attack source tracing, run the auto-defend protocol command.  | 
auto-defend action  | 
Action taken on the attack source. The value can be: 
  | 
auto-defend whitelist 1  | 
Whitelist for attack source tracing. For related commands, see auto-defend whitelist.  |