You can determine whether an attack event or source exists by checking alarm information and attack event reports. After an attack source is confirmed, you can configure a user-defined group for which attack defense is enabled to isolate the attack source.
If a device works abnormally (for example, a device encounters CPU overloads, logout, route interruption), you can configure a user-defined group for which attack defense is enabled to isolate the attack sources.
If services are restored and run properly later after the preceding operations, deliver an attack defense policy to apply the blacklist and interface or sub-interface shutdown actions to the forwarding plane.