Verifying the CPU Attack Defense Configuration
Procedure
- Run the display cpu-defend policy [ policy-name ] command to check the attack defense policy.
- Run the display cpu-defend statistics [ history ] [ packet-type packet-type ] { all | slot slot-id } command to check statistics about packets sent to the CPU.
- Run the display cpu-defend rate [ packet-type packet-type ] { all | slot slot-id } command to check the rate of protocol packets sent to the CPU.
- Run the display cpu-defend rate enp packet-type packet-type { all | slot slot-id } command to check the rate of packets for which rate limiting in enhanced mode is performed.
The CE12800E does not support this command.
- Run the display cpu-defend configuration [ packet-type packet-type ] { all | slot slot-id } command to check the CAR configuration for protocol packets sent to the CPU.
- Run the display cpu-defend configuration enp packet-type packet-type { all | slot slot-id } command to check the configuration of packet rate limiting in enhanced mode.
The CE12800E does not support this command.
- Run the display cpu-defend statistics [ history ] enp packet-type packet-type { all | slot slot-id } command to check statistics about packets for which rate limiting in enhanced mode is performed.
- Run the display cpu-defend { blacklist | filter } statistics [ slot slot-id ] command to check statistics about the packets sent to the CPU based on blacklist or filter.
In V200R003C00 and later versions of CE12800, after blacklist or filter is configured, you must run the cpu-defend-policy statistics enable command first, and then run the display cpu-defend { blacklist | filter } statistics [ slot slot-id ] command to view statistics about packets sent to the CPU based on blacklist or filter.
- Run the display cpu-defend auto-port-defend [ slot slot-id ] command to check information about the port to which port-based automatic local attack defense is applied and statistics about the protocol packets sent to the CPU.
- Run the display cpu-defend local-host anti-attack [ slot slot-id ] command to check statistics about the packets matching hardware ACLs after host attack defense is enabled.