Default Settings for Local Attack Defense
Table 6-2 and Table 6-3 list the default settings for local attack defense. The default settings can be modified as required.
Parameter |
Default Setting |
---|---|
CPU attack defense policy |
CPU attack defense policy named devicename-default |
Blacklist |
None |
CAR value |
By default, the device limits the rates of packets based on the default rate limits in the devicename-default policy. To check the CAR value, run the display cpu-defend configuration command. |
Parameter |
Default Setting |
---|---|
Attack defense policy |
Attack defense policy named devicename-default |
Automatic attack source tracing |
Disabled |
Threshold for attack source tracing |
128 pps |
Packet sampling ratio for attack source tracing |
8 |
Attack source tracing mode |
Attack source tracing based on source MAC addresses and source IP addresses |
Types of traced packets |
ARP, DHCP, DHCPv6, ICMP, ICMPv6, MLD, ND, IGMP, and TTL-expired packets |
Whitelist |
None |
Alarm function for attack source tracing |
Disabled |
Alarm threshold for attack source tracing |
128 pps |
Punish function for attack source tracing |
Disabled |