auto-defend trace-type
Function
The auto-defend trace-type command configures an attack source tracing mode.
The undo auto-defend trace-type command deletes an attack source tracing mode.
By default, the device traces attack sources based on source MAC addresses, source IP addresses, and source ports+VLANs.
Format
auto-defend trace-type { source-mac | source-ip | source-portvlan }*
undo auto-defend trace-type { source-mac | source-ip | source-portvlan }*
Parameters
Parameter | Description | Value |
---|---|---|
source-mac | Configures the device to trace attack sources based on source MAC addresses so that the device classifies and collects statistics based on the source MAC address and identifies the attack source. | - |
source-ip | Configures the device to trace attack sources based on source IP addresses so that the device classifies and collects statistics based on the source IP address and identifies the attack source. | - |
source-portvlan | Configures the device to trace attack sources based on source ports+VLANs so that the device classifies and collects statistics based on the source port and VLAN and identifies the attack source. | - |
Usage Guidelines
Usage Scenario
After enabling attack source tracing, you can specify one or more attack source tracing modes. The device then uses the specified modes to trace attack sources.
The device supports the following attack source tracing modes:
- Source IP address-based tracing: defends against Layer 3 attack packets.
- Source MAC address-based tracing: defends against Layer 2 attack packets with a fixed source MAC address.
- Source port+VLAN based tracing: defends against Layer 2 attack packets with different source MAC addresses.
Prerequisites
Attack source tracing has been enabled using the auto-defend enable command.
Precautions
If you run the auto-defend trace-type command multiple times, multiple attack source tracing modes are specified.
After the attack source tracing function is enabled on the device, you can run the display auto-defend attack-source command to view attack source tracing information if an attack occurs.
By default, the device traces attack sources based on source MAC addresses, source IP addresses, and source ports+VLANs. To cancel an attack source tracing mode, run the undo auto-defend trace-type command.