No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search


To have a better experience, please upgrade your IE browser.


Configuration Guide - Security

CloudEngine 8800, 7800, 6800, and 5800 V200R005C10

This document describes the configurations of Security, including ACL, local attack defense, MFF, attack defense, traffic suppression and storm control, ARP security, Port security, DHCP snooping, ND snooping, PPPoE+, IPSG, SAVI, separating the management plane from the service plane, security risks.
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Configuring Defense Against Malformed Packet Attacks

Configuring Defense Against Malformed Packet Attacks


Malformed packet attacks include flood attacks without IP payloads, attacks from IGMP null payload packets, LAND attacks, Smurf attacks, and attacks from packets with invalid TCP flag bits. A malformed packet attack occurs when malformed IP packets are sent to a target system, causing the system to work abnormally or break down. In addition, the attacker may send a large number of invalid packets to occupy network bandwidth.

To prevent the system from breaking down and to ensure non-stop network services, enable defense against malformed packet attacks on the device. After detecting malformed packets, the device discards them.


  1. Run system-view

    The system view is displayed.

  2. Run anti-attack abnormal enable

    Defense against malformed packet attacks is enabled.

    By default, defense against malformed packet attacks is enabled.

    You can also run the anti-attack enable command in the system view to enable attack defense against all attack packets including malformed packets.

  3. Run commit

    The configuration is committed.

Verifying the Configuration

  • Run the display anti-attack statistics abnormal command to check statistics on defense against malformed packet attacks on the device.

Updated: 2019-04-20

Document ID: EDOC1100074765

Views: 27929

Downloads: 97

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Previous Next