No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

Fat AP and Cloud AP V200R010C00 Command Reference

Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
auto-defend enable

auto-defend enable

Function

The auto-defend enable command enables automatic attack source tracing.

The undo auto-defend enable command disables automatic attack source tracing.

By default, automatic attack source tracing is disabled.

Format

auto-defend enable

undo auto-defend enable

Parameters

None

Views

Attack defense policy view

Default Level

2: Configuration level

Usage Guidelines

Usage Scenario

A large number of attack packets may attack the device CPU. Attack source tracing enables the device to trace attack sources and send logs or alarms to notify the administrator so that the administrator can take measures to defend against the attacks. By default, logs are sent to notify the administrator if attack source tracing is enabled.

After automatic attack source tracing is enabled, the device traces the source of the following packets sent to the CPU:
  • Address Resolution Protocol (ARP) packets
  • Dynamic Host Configuration Protocol (DHCP) packets
  • Internet Group Management Protocol (IGMP) packets
  • Internet Control Management Protocol (ICMP) packets
  • Telnet packets
  • Transmission Control Protocol (TCP) packets
  • TTL-expired packets

Precautions

Attack source tracing configured in an attack defense policy takes effect only when the attack defense policy is applied in the system view.

Example

# Enable attack source tracing in the attack defense policy named test.

<Huawei> system-view
[Huawei] cpu-defend policy test
[Huawei-cpu-defend-policy-test] auto-defend enable
Related Topics
Translation
Download
Updated: 2019-11-21

Document ID: EDOC1100064352

Views: 198904

Downloads: 122

Average rating:
This Document Applies to these Products
Related Version
Related Documents
Share
Previous Next