The display nat flow-defend reverse-blacklist command displays blacklist entries about a new flow from the public network to the private network on a CPU.
This command is supported only on the NetEngine 8000 F1A.
The actual command output varies according to the device. The command output here is only an example.
<HUAWEI> display nat flow-defend reverse-blacklist Slot: 1 Current total reverse-blacklists: 1(Ip+Port). Victim information(IP,port): (10.33.33.2,0) Attacker information(IP,port): (1.1.1.2,0) Protocol: UDP, VPN: - Create: 2017-6-25 10:25:43, Left: 00:10:00 Current Attack-rate: 129kpps, Max Attack-rate: 129kpps Current total reverse-blacklists: 1(Ip). Victim information(IP): (10.33.33.2) Attacker information(IP,port): (1.1.1.2,0) VPN: - Create: 2017-6-25 10:25:43, Left: 00:10:00 Current Attack-rate: 129kpps, Max Attack-rate: 129kpps
| Item | Description |
|---|---|
| Current Attack-rate | Rate at which attack packets are sent. |
| Victim information(IP,port) | Victim information. |
| Victim information(IP) | Victim information. |
| Attacker information(IP,port) | Attacker information. |
| Max Attack-rate | Maximum rate at which attack packets are sent. |
| Protocol | Protocol. |
| Create | Date and time when blacklist entries were created. |
| VPN | Name of a VPN instance. |
| Left | Remaining time before blacklist entries age. |
| Slot | Slot ID. |