No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

Configuration Guide - Security

CloudEngine 8800, 7800, 6800, and 5800 V200R005C10

This document describes the configurations of Security, including ACL, local attack defense, MFF, attack defense, traffic suppression and storm control, ARP security, Port security, DHCP snooping, ND snooping, PPPoE+, IPSG, SAVI, separating the management plane from the service plane, security risks.
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Verifying the CPU Attack Defense Configuration

Verifying the CPU Attack Defense Configuration

Procedure

  • Run the display cpu-defend policy [ policy-name ] command to check the attack defense policy.
  • Run the display cpu-defend statistics [ history ] [ packet-type packet-type ] { all | slot slot-id } command to check statistics about packets sent to the CPU.
  • Run the display cpu-defend rate [ packet-type packet-type ] { all | slot slot-id } command to check the rate of protocol packets sent to the CPU.
  • Run the display cpu-defend rate enp packet-type packet-type { all | slot slot-id } command to check the rate of packets for which rate limiting in enhanced mode is performed.
  • Run the display cpu-defend configuration [ packet-type packet-type ] { all | slot slot-id } command to check the CAR configuration for protocol packets sent to the CPU.
  • Run the display cpu-defend configuration enp packet-type packet-type { all | slot slot-id } command to check the configuration of packet rate limiting in enhanced mode.
  • Run the display cpu-defend statistics [ history ] enp packet-type packet-type { all | slot slot-id } command to check statistics about packets for which rate limiting in enhanced mode is performed.
  • Run the display cpu-defend { blacklist | filter } statistics [ slot slot-id ] command to check statistics about the packets sent to the CPU based on blacklist or filter.

    NOTE:
    In V200R003C00 and later versions of CE6870EI and CE6875EI switches, after blacklist or filter is configured, you must run the cpu-defend-policy statistics enable command first, and then run the display cpu-defend { blacklist | filter } statistics [ slot slot-id ] command to view statistics about packets sent to the CPU based on blacklist or filter.

  • Run the display cpu-defend auto-port-defend [ slot slot-id ] command to check information about the port to which port-based automatic local attack defense is applied and statistics about the protocol packets sent to the CPU.
  • Run the display cpu-defend local-host anti-attack [ slot slot-id ] command to check statistics about the packets matching hardware ACLs after host attack defense is enabled.
Translation
Download
Updated: 2019-04-20

Document ID: EDOC1100074765

Views: 29563

Downloads: 97

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Share
Previous Next