Configuring the Types of Traced Packets
Context
When an attack occurs, the device traces packets of all types, and the administrator cannot identify the type of attack packets. You can specify the types of packets that the device traces.
Procedure
- Run system-view
The system view is displayed.
- Run cpu-defend policy policy-name
The attack defense policy view is displayed.
- Run auto-defend enable
Attack source tracing is enabled.
By default, attack source tracing is disabled.
- Run auto-defend protocol { all | { arp | dhcp | dhcpv6 | icmp | icmpv6 | igmp | mld | nd | ttl-expired } * }
The type of traced packets is specified.
By default, the device traces sources of Address Resolution Protocol (ARP), Dynamic Host Configuration Protocol (DHCP), DHCPv6, Internet Control Message Protocol (ICMP), ICMPv6, Multicast Listener Discovery Protocol (MLD), Neighbor Discovery Protocol (ND), Internet Group Management Protocol (IGMP), and Time To Live-expired (TTL-expired) packets in attack source tracing.
CE12800E does not support mld packet after having the ED-E, EG-E, and EGA-E series cards installed.
The attack source tracing function takes effect only on the packets configured using this command.
- Run commit
The configuration is committed.