display cpu-defend policy

Function

The display cpu-defend policy command displays information about a specified attack defense policy.

Format

display cpu-defend policy policy-number

Parameters

Parameter Description Value
policy-number

Specifies the number of a configured attack defense policy.

The value is an integer that ranges from 1 to 30.

Views

All views

Default Level

1: Monitoring level

Task Name and Operations

Task Name Operations
device-mgr read

Usage Guidelines

Usage Scenario

You can run the display cpu-defend policy command to view information about the user-defined attack defense policy.

Prerequisites

The attack defense policy, whose information is to be viewed, must be a configured one.

In VS mode, this command is supported only by the admin VS.

Example

The actual command output varies according to the device. The command output here is only an example.

# Display information about attack defense policy 1.
<HUAWEI> display cpu-defend policy 1
 Number : 1                                                                     
 Description :                                                                  
 Related slot : <1>                                                             
 Configuration :                                                         
 Whitelist Configuration :                                                      
 Whitelist enable : open                                                        
 Whitelist ACL number : 0                                                       
 Whitelist : CIR(4000)    CBS(40000)  Fixed-packet-length(128)                    
 Whitelist priority : middle                                                    
 Whitelist alarm enable : close                                                 
 Whitelist alarm : threshold(1000000) interval(3600) speed-threshold(300)       
 Whitelist BGP : CIR(4000)    CBS(600000)  Fixed-packet-length(128)
 Whitelist LDP : CIR(4000)    CBS(600000)  Fixed-packet-length(128)
 Whitelist OSPF : CIR(4000)    CBS(600000)  Fixed-packet-length(128)
 Whitelist RADIUS : CIR(1500)    CBS(600000)  Fixed-packet-length(128)
 Whitelist RSVP : CIR(4000)    CBS(600000)  Fixed-packet-length(128)
 Whitelist ISIS : CIR(5000)    CBS(600000)  Fixed-packet-length(128)
 Whitelist IPV6 ACL number : 0
 Whitelist IPV6 : CIR(4000)    CBS(600000)  Fixed-packet-length(128)        
 Whitelist IPV6 priority : default
 Whitelist IPV6 alarm enable : open 
 Whitelist IPV6 alarm : threshold(30000) interval(600) speed-threshold(300) 
 Whitelist BGPv6 : CIR(4000)    CBS(600000)  Fixed-packet-length(128)
 Whitelist OSPFv3 : CIR(4000)    CBS(600000)  Fixed-packet-length(128)
 Blacklist Configuration :                                                      
 Blacklist enable : open                                                        
 Blacklist ACL number : 0                                                       
 Blacklist IPV6 ACL number : 0
 Blacklist : CIR(1)       CBS(1000)   Fixed-packet-length(128)                    
 Blacklist priority : middle                                                    
 Blacklist alarm enable : close                                                 
 Blacklist alarm : threshold(1000000) interval(3600)                             
 ARP Configuration :                                                            
 Outbound ARP check enable : open                                               
 Total packet Configuration :                                                   
 Total packet car speed : high                                                  
 Total packet alarm enable : close                                              
 Total packet alarm : threshold(1000000) interval(3600)                         
 Process-sequence : tcpsyn-flood fragment-flood dynamic-link-protection management-acl whitelist blacklist user-defined-flow
 Dynamic link protection Configuration : 
 Dynamic link protection enable : open
 Application apperceive Configuration :                                         
 Application apperceive enable : open                                           
 Default Action: Min-to-cp                                                      
 Application apperceive alarm enable : open                                     
 Application apperceive alarm : threshold(1000000) interval(3600) speed-threshold(300)                                                                                 
 MA-Defend Configuration :                                                      
 MA-Defend alarm enable : open                                                  
 MA-Defend alarm : threshold(1000000) interval(3600)                                                                                                           
 Source Trace Data Configuration :                                              
 Source Trace enable : open                                                     
 Source Trace Type enable :                                                     
 car: open                                                                      
 urpf: open   
 tcpip-defend: open                                                             
 ma-defend: open                                                                
 application-apperceive: open                                                   
 totalcar: open 
 Source Trace Sample : 100                                                      
 Source Trace IPv4 Packet Length : 64                                               
 Source Trace IPv6 Packet Length : 96                                                                               
 URPF Configuration :
 URPF model : close
 allow default route: close 
 URPF alarm enable : open   
 URPF alarm : threshold(30000) interval(600) speed-threshold(300)
 TCPIP-Defend Configuration : 
 Abnormal Packet Defend : open                                                  
 Udp Packet Defend : open                                                       
 Tcpsyn Flood Defend : open                                                     
 Tcpsyn : CIR(1500)    CBS(15000)  Fixed-packet-length(128)                       
 Tcpsyn priority : middle                                                       
 fragment-flood Defend : open                                                   
 Ip fragment : CIR(3000)    CBS(30000)  Fixed-packet-length(128)                  
 Ip fragment priority : middle                                                  
 TCPIP alarm enable : open                                                      
 TCPIP alarm : threshold(1000000) interval(3600) speed-threshold(300)                                                                                         
 User-defined-flow Configuration :                                             
 User-defined-flow's alarm default configuration :                                  
 alarm enable : open, alarm value : threshold(30000) interval(600) speed-threshold(300) 
 User-defined-flow  1 : CIR(2000)    CBS(20000)  Fixed-packet-length(128)       
 User-defined-flow  2 : CIR(2000)    CBS(20000)  Fixed-packet-length(128)         
 User-defined-flow  3 : CIR(2000)    CBS(20000)  Fixed-packet-length(128)         
 User-defined-flow  4 : CIR(2000)    CBS(20000)  Fixed-packet-length(128)         
 User-defined-flow  5 : CIR(2000)    CBS(20000)  Fixed-packet-length(128)      
 User-defined-flow  6 : CIR(2000)    CBS(20000)  Fixed-packet-length(128)         
 User-defined-flow  7 : CIR(2000)    CBS(20000)  Fixed-packet-length(128)         
 User-defined-flow  8 : CIR(2000)    CBS(20000)  Fixed-packet-length(128)         
 User-defined-flow  9 : CIR(2000)    CBS(20000)  Fixed-packet-length(128)         
 User-defined-flow 10 : CIR(2000)    CBS(20000)  Fixed-packet-length(128)         
 User-defined-flow 11 : CIR(2000)    CBS(20000)  Fixed-packet-length(128)       
 User-defined-flow 12 : CIR(2000)    CBS(20000)  Fixed-packet-length(128)        
 User-defined-flow 13 : CIR(2000)    CBS(20000)  Fixed-packet-length(128)         
 User-defined-flow 14 : CIR(2000)    CBS(20000)  Fixed-packet-length(128)      
 User-defined-flow 15 : CIR(2000)    CBS(20000)  Fixed-packet-length(128)      
 User-defined-flow 16 : CIR(2000)    CBS(20000)  Fixed-packet-length(128)     
 User-defined-flow 17 : CIR(2000)    CBS(20000)  Fixed-packet-length(128)      
 User-defined-flow 18 : CIR(2000)    CBS(20000)  Fixed-packet-length(128)   
 User-defined-flow 19 : CIR(2000)    CBS(20000)  Fixed-packet-length(128)       
 User-defined-flow 20 : CIR(2000)    CBS(20000)  Fixed-packet-length(128)          
 User-defined-flow 21 : CIR(2000)    CBS(20000)  Fixed-packet-length(128)          
 User-defined-flow 22 : CIR(2000)    CBS(20000)  Fixed-packet-length(128)          
 User-defined-flow 23 : CIR(2000)    CBS(20000)  Fixed-packet-length(128)      
 User-defined-flow 24 : CIR(2000)    CBS(20000)  Fixed-packet-length(128)          
 User-defined-flow 25 : CIR(2000)    CBS(20000)  Fixed-packet-length(128)   
 User-defined-flow 26 : CIR(2000)    CBS(20000)  Fixed-packet-length(128)
 User-defined-flow 27 : CIR(2000)    CBS(20000)  Fixed-packet-length(128)
 User-defined-flow 28 : CIR(2000)    CBS(20000)  Fixed-packet-length(128)
 User-defined-flow 29 : CIR(2000)    CBS(20000)  Fixed-packet-length(128)
 User-defined-flow 30 : CIR(2000)    CBS(20000)  Fixed-packet-length(128)
 User-defined-flow 31 : CIR(2000)    CBS(20000)  Fixed-packet-length(128)
 User-defined-flow 32 : CIR(2000)    CBS(20000)  Fixed-packet-length(128)
 User-defined-flow 33 : CIR(2000)    CBS(20000)  Fixed-packet-length(128)         
 User-defined-flow 34 : CIR(2000)    CBS(20000)  Fixed-packet-length(128)
 User-defined-flow 35 : CIR(2000)    CBS(20000)  Fixed-packet-length(128)  
 User-defined-flow 36 : CIR(2000)    CBS(20000)  Fixed-packet-length(128)
 User-defined-flow 37 : CIR(2000)    CBS(20000)  Fixed-packet-length(128)
 User-defined-flow 38 : CIR(2000)    CBS(20000)  Fixed-packet-length(128)
 User-defined-flow 39 : CIR(2000)    CBS(20000)  Fixed-packet-length(128)
 User-defined-flow 40 : CIR(2000)    CBS(20000)  Fixed-packet-length(128)
 User-defined-flow 41 : CIR(2000)    CBS(20000)  Fixed-packet-length(128)
 User-defined-flow 42 : CIR(2000)    CBS(20000)  Fixed-packet-length(128)
 User-defined-flow 43 : CIR(2000)    CBS(20000)  Fixed-packet-length(128)
 User-defined-flow 44 : CIR(2000)    CBS(20000)  Fixed-packet-length(128)
 User-defined-flow 45 : CIR(2000)    CBS(20000)  Fixed-packet-length(128)
 User-defined-flow 46 : CIR(2000)    CBS(20000)  Fixed-packet-length(128)
 User-defined-flow 47 : CIR(2000)    CBS(20000)  Fixed-packet-length(128)
 User-defined-flow 48 : CIR(2000)    CBS(20000)  Fixed-packet-length(128)
 User-defined-flow 49 : CIR(2000)    CBS(20000)  Fixed-packet-length(128)
 User-defined-flow 50 : CIR(2000)    CBS(20000)  Fixed-packet-length(128)
 User-defined-flow 51 : CIR(2000)    CBS(20000)  Fixed-packet-length(128)
 User-defined-flow 52 : CIR(2000)    CBS(20000)  Fixed-packet-length(128)
 User-defined-flow 53 : CIR(2000)    CBS(20000)  Fixed-packet-length(128)
 User-defined-flow 54 : CIR(2000)    CBS(20000)  Fixed-packet-length(128)
 User-defined-flow 55 : CIR(2000)    CBS(20000)  Fixed-packet-length(128)
 User-defined-flow 56 : CIR(2000)    CBS(20000)  Fixed-packet-length(128)
 User-defined-flow 57 : CIR(2000)    CBS(20000)  Fixed-packet-length(128)
 User-defined-flow 58 : CIR(2000)    CBS(20000)  Fixed-packet-length(128)
 User-defined-flow 59 : CIR(2000)    CBS(20000)  Fixed-packet-length(128)
 User-defined-flow 60 : CIR(2000)    CBS(20000)  Fixed-packet-length(128)
 User-defined-flow 61 : CIR(2000)    CBS(20000)  Fixed-packet-length(128)
 User-defined-flow 62 : CIR(2000)    CBS(20000)  Fixed-packet-length(128)
 User-defined-flow 63 : CIR(2000)    CBS(20000)  Fixed-packet-length(128)
 User-defined-flow 64 : CIR(2000)    CBS(20000)  Fixed-packet-length(128)
 Car Configuration :
 All the supported cpcar's alarm default configuration :
 alarm enable : open, alarm value : threshold(30000) interval(600) speed-threshold(300)
 Car isis: Min-packet-length(512)
 Car arp: CIR(32) 
 Enhance Configuration :
 IPv6 enhance acl enable : close
 Ttl-expired-loop Configuration :                                              
 Ttl-expired-loop alarm enable : open                                          
 Ttl-expired-loop alarm : threshold(10) interval(60)                           
 Acl Enable Configuration :                                                    
 Acl ipv4-multicast-fib-miss enable : close                                    
 Cp-Acl-IP-Pool Configuration :                                                
 Cp-acl ip-pool enable : close                                                
 Management-Acl Configuration : 
 Management acl enable : open
Table 1 Description of the display cpu-defend policy command output
Item Description
Number

Number of an attack defense policy.

Description

Description of the attack defense policy.

Related slot

interface board to which the attack defense policy is applied.

Configuration

Configurations of attack defense policy 8.

Whitelist Configuration

Configurations of the whitelist.

Whitelist enable

Whether the whitelist is enabled.

Whitelist ACL number

Number of the ACL rule for joining the whitelist.

Whitelist

CAR configurations of the IPv4 whitelist for packets, except packets of the following IPv4 protocols.

Whitelist priority

Sending priority of the whitelist.

Whitelist alarm enable

Whether the whitelist alarm is enabled.

Whitelist alarm

Alarm threshold and checking interval for the whitelist.

Whitelist BGP

CAR rule defined by the BGP whitelist.

Whitelist LDP

CAR rule defined by the LDP whitelist.

Whitelist OSPF

CAR rule defined by the OSPF whitelist.

Whitelist RADIUS

CAR rule defined by the RADIUS whitelist.

Whitelist RSVP

CAR rule defined by the RSVP whitelist.

Whitelist ISIS

CAR rule defined by the IS-IS whitelist.

Whitelist IPV6 ACL number

Number of the ACL rule added to the IPv6 whitelist.

Whitelist IPV6

CAR configurations of the IPv6 whitelist for packets, except packets of the following IPv6 protocols.

Whitelist IPV6 priority

Priority of sending the packets matching the IPv6 whitelist to the CPU.

Whitelist IPV6 alarm enable

Whether the alarm function is enabled for the IPv6 whitelist.

Whitelist IPV6 alarm

Alarm threshold and check interval configured for the IPv6 whitelist.

Whitelist BGPv6

CAR rule defined by the BGPv6 whitelist.

Whitelist OSPFv3

CAR rule defined by the OSPFv3 whitelist.

alarm enable

Alarm enable.

Blacklist Configuration

Configurations of the blacklist.

Blacklist enable

Whether the blacklist is enabled.

Blacklist ACL number

Number of the ACL rule for joining the blacklist.

Blacklist IPV6 ACL number

Number of the ACL rule added to the IPv6 blacklist.

Blacklist

CAR configurations of the blacklist.

Blacklist priority

Sending priority of the blacklist.

Blacklist alarm enable

Whether the blacklist alarm is enabled.

Blacklist alarm

Alarm threshold and checking interval for the blacklist.

Total packet Configuration

Configurations of packets to be sent to the CPU.

Total packet car speed

Total rate for sending the packets to the CPU.

Total packet alarm enable

Whether the alarm for sending packets to the CPU is enabled.

Total packet alarm

Alarm threshold and checking interval for all packets to be sent to the CPU.

car

Whether CAR is enabled.

Process-sequence

Matching sequence of packets to be sent to the CPU.

Cp-acl ip-pool enable

Enabled status of the ACL IP address pool.

Application apperceive Configuration

Configurations of application layer association.

Application apperceive enable

Whether application layer association is enabled.

Application apperceive alarm enable

Whether the alarm for application layer association is enabled.

Application apperceive alarm

Alarm threshold and checking interval for application layer association.

Default Action

Default mode of application layer association to process packets to be sent to the CPU.

MA-Defend Configuration

Configurations of management and application.

MA-Defend alarm enable

Whether the alarm for management and application is enabled.

MA-Defend alarm

Alarm threshold and checking interval for management and application.

Source Trace Data Configuration

Configurations of attack source tracing.

Source Trace enable

Whether attack source tracing is enabled.

Source Trace Type enable

Type of enabled attack source tracing.

Source Trace Sample

Sampling ratio for packets that record attack source tracing.

Source Trace IPv4 Packet Length

Length of the IPv4 packet that records attack source tracing.

Source Trace IPv6 Packet Length

Length of the IPv6 packet that records attack source tracing.

IPv6 enhance acl enable

Enabled status of enhanced ACLs for IPv6 attack defense.

URPF Configuration

URPF configurations.

URPF model

URPF mode.

URPF alarm enable

Whether the alarm function is enabled for URPF.

URPF alarm

URPF alarm configurations.

allow default route

Whether URPF allows default route match.

TCPIP-Defend Configuration

Configurations of TCP/IP attack defense.

Abnormal Packet Defend

Whether defense against malformed packets is enabled.

Udp Packet Defend

Whether defense against UDP packets is enabled.

Tcpsyn Flood Defend

Whether defense against syn flood packets is enabled.

Tcpsyn

Whether the alarm for defense against syn flood packets is enabled.

Tcpsyn priority

Sending priority of packets that match the syn rule.

Ip fragment

CAR rule for defense against IP packet fragments.

Ip fragment priority

Sending priority of packets that match the IP packet fragment rule.

TCPIP alarm enable

Whether the alarm for TCP/IP attack defense is enabled.

TCPIP alarm

Alarm threshold and checking interval for TCP/IP attack defense.

User-defined-flow Configuration

Configurations of the user-defined flow.

User-defined-flow 1

User defined flow 1.

User-defined-flow 2

User defined flow 2.

User-defined-flow 3

User defined flow 3.

User-defined-flow 4

User defined flow 4.

User-defined-flow 5

User defined flow 5.

User-defined-flow 6

User defined flow 6.

User-defined-flow 7

User defined flow 7.

User-defined-flow 8

User defined flow 8.

User-defined-flow 9

User defined flow 9.

User-defined-flow 10

User defined flow 10.

User-defined-flow 11

User defined flow 11.

User-defined-flow 12

User defined flow 12.

User-defined-flow 13

User defined flow 13.

User-defined-flow 14

User defined flow 14.

User-defined-flow 15

User defined flow 15.

User-defined-flow 16

User defined flow 16.

User-defined-flow 17

User defined flow 17.

User-defined-flow 18

User defined flow 18.

User-defined-flow 19

User defined flow 19.

User-defined-flow 20

User defined flow 20.

User-defined-flow 21

User defined flow 21.

User-defined-flow 22

User defined flow 22.

User-defined-flow 23

User defined flow 23.

User-defined-flow 24

User defined flow 24.

User-defined-flow 25

User defined flow 25.

User-defined-flow 26

User defined flow 26.

User-defined-flow 27

User defined flow 27.

User-defined-flow 28

User defined flow 28.

User-defined-flow 29

User defined flow 29.

User-defined-flow 30

User defined flow 30.

User-defined-flow 31

User defined flow 31.

User-defined-flow 32

User defined flow 32.

User-defined-flow 33

User-defined flow 33.

User-defined-flow 34

User-defined flow 34.

User-defined-flow 35

User-defined flow 35.

User-defined-flow 36

User-defined flow 36.

User-defined-flow 37

User-defined flow 37.

User-defined-flow 38

User-defined flow 38.

User-defined-flow 39

User-defined flow 39.

User-defined-flow 40

User-defined flow 40.

User-defined-flow 41

User-defined flow 41.

User-defined-flow 42

User-defined flow 42.

User-defined-flow 43

User-defined flow 43.

User-defined-flow 44

User-defined flow 44.

User-defined-flow 45

User-defined flow 45.

User-defined-flow 46

User-defined flow 46.

User-defined-flow 47

User-defined flow 47.

User-defined-flow 48

User-defined flow 48.

User-defined-flow 49

User-defined flow 49.

User-defined-flow 50

User-defined flow 50.

User-defined-flow 51

User-defined flow 51.

User-defined-flow 52

User-defined flow 52.

User-defined-flow 53

User-defined flow 53.

User-defined-flow 54

User-defined flow 54.

User-defined-flow 55

User-defined flow 55.

User-defined-flow 56

User-defined flow 56.

User-defined-flow 57

User-defined flow 57.

User-defined-flow 58

User-defined flow 58.

User-defined-flow 59

User-defined flow 59.

User-defined-flow 60

User-defined flow 60.

User-defined-flow 61

User-defined flow 61.

User-defined-flow 62

User-defined flow 62.

User-defined-flow 63

User-defined flow 63.

User-defined-flow 64

User-defined flow 64.

User-defined-flow's alarm default configuration

User-defined-flow's alarm default configuration.

Car Configuration

Configurations of CAR.

Car isis

Car isis.

Car arp

Car arp.

All the supported cpcar's alarm default configuration

All the supported cpcar's alarm default configuration.

Ttl-expired-loop alarm enable

Enabled status of the TTL timeout loop detection alarm function.

Ttl-expired-loop alarm

TTL timeout loop detection alarm threshold and interval at which the detection is implemented.

Ttl-expired-loop Configuration

Ttl-expired-loop Configuration.

Acl Enable Configuration

ACL enabling configurations.

Acl ipv4-multicast-fib-miss enable

Whether the function of matching IPv4 MFIB-MISS packets against ACL rules is enabled.

Management-Acl Configuration

Configuration of the management protocol ACL delivering function.

Management acl enable

Status of the management protocol ACL delivering function.

Dynamic link protection Configuration

Configuration of the dynamic link protection function.

Dynamic link protection enable

Status of the dynamic link protection function.

Fragment-flood Defend

Whether defense against packet fragments is enabled.

Cp-Acl-IP-Pool Configuration

ACL-based address pool configuration.

ARP Configuration

ARP configurations.

Outbound ARP check enable

Whether checking downlink ARP packets is enabled.

Enhance Configuration

Enhance Configuration.

urpf

Whether URPF is enabled.

tcpip-defend

Whether TCP/IP attack defense is enabled.

ma-defend

Whether the management and application function is enabled.

application-apperceive

Whether application layer association is enabled.

totalcar

Status of total CAR attack source tracing.

Copyright © Huawei Technologies Co., Ltd.
Copyright © Huawei Technologies Co., Ltd.
< Previous topic Next topic >