Checking the Configurations

After configuring attack source tracing, you can view information about packets discarded by each functional module, including the interface that receives the packets, VLAN to which the interface that receives the packets belongs, and the time packets are discarded.

Procedure

  1. Run the following commands to view verbose information about attack source tracing.

    • display attack-source-trace slot { slot-id | all } verbose [ { attack-type { totalcar | car | application-apperceive | tcpip-defend | ma-defend } } | { source-mac source-mac source-mac-mask } | { destination-mac dest-mac dest-mac-mask } | { vlan vlan-id } | { source source-ip source-ip-mask } | { destination destination-ip destination-ip-mask } | { source-port source-port-number } | { destination-port dest-port-number } | { protocol-number protocol-number } | { time-range from begin-time [ to end-time ] } | { car-index car-index } | { source-ipv6 source-ipv6-address source-ipv6-prefixlen } | { destination-ipv6 destination-ipv6-address destination-ipv6-prefixlen } | { next-header next-header } ] *

    • display attack-source-trace file filename verbose [ { source-mac source-mac source-mac-mask } | { destination-mac dest-mac dest-mac-mask } | { source source-ip source-ip-mask } | { destination destination-ip destination-ip-mask } | { source-port source-port-number } | { vlan vlan-id } | { destination-port destination-port-number } | { protocol-number protocol-number } | { time-range from begin-time [ to end-time ] } | { source-ipv6 source-ipv6-address source-ipv6-prefixlen } | { destination-ipv6 destination-ipv6-address destination-ipv6-prefixlen } | { next-header next-header } ] *

  2. Run the following commands to view brief information about attack source tracing.

    • display attack-source-trace slot { slot-id | all } brief [ { source source-ip source-ip-mask } | { destination destination-ip destination-ip-mask } | { source-port source-port-number } | { destination-port dest-port-number } | { protocol-number protocol-number } | { time-range from begin-time [ to end-time ] } | { attack-type { totalcar | car | application-apperceive | tcpip-defend | ma-defend } } | { car-index car-index } | { source-ipv6 source-ipv6-address source-ipv6-prefixlen } | { destination-ipv6 destination-ipv6-address destination-ipv6-prefixlen } | { next-header next-header } ] *

    • display attack-source-trace file filename brief [ { source source-ip source-ip-mask } | { destination destination-ip destination-ip-mask } | { source-port source-port-number } | { destination-port destination-port-number } | { protocol-number protocol-number } | { time-range from begin-time [ to end-time ] } | { source-ipv6 source-ipv6-address source-ipv6-prefixlen } | { destination-ipv6 destination-ipv6-address destination-ipv6-prefixlen } | { next-header next-header } ] *

  3. Run the display attack-source-trace slot { slot-id | all } original-information command to check original information about attack source tracing on the interface board.
Copyright © Huawei Technologies Co., Ltd.
Copyright © Huawei Technologies Co., Ltd.
< Previous topic