10-20
Cisco SCE8000 Software Configuration Guide, Rel 3.1.6S
OL-16479-01
Chapter 10 Identifying and Preventing Distributed-Denial-Of-Service Attacks
Monitoring Attack Filtering
How to Configure a force-filter Setting for a Specified Situation
Step 1 From the SCE(config if)# prompt, type attack-filter force-filter protocol (((TCP|UDP) [dest-port
(port-number |not-specific))|ICMP|other) attack-direction
(((single-side-source|single-side-destination|single-side-both) (ip
ip-address)|(dual-sided source-ip
source-ip-address destination-ip
dest-ip-address)) side
(subscriber|network|both)[notify-subscriber] and press Enter.
How to Remove a force-filter Setting from a Specified Situation
Step 1 From the SCE(config if)# prompt, type no attack-filter force-filter protocol (((TCP|UDP) [dest-port
(port-number |not-specific))|ICMP|other) attack-direction
(((single-side-source|single-side-destination|single-side-both) (ip ip-address)|(dual-sided source-ip
source-ip-address destination-ip dest-ip-address)) side (subscriber|network|both) and press Enter.
How to Remove All force-filter Settings
Step 1 From the SCE(config if)# prompt, type no attack-filter force-filter all and press Enter.
Monitoring Attack Filtering
• Monitoring Attack Filtering Using SNMP Traps, page 10-20
• Monitoring Attack Filtering Using CLI Commands, page 10-22
• Viewing the Attack Log, page 10-28
There are three options for monitoring attack filtering and detection:
• CLI show commands
• SNMP attack detection traps
• Attack log
Monitoring Attack Filtering Using SNMP Traps
The system sends a trap at the start of a specific attack detection event, and also when a specific detection
event ends, as follows:
• STARTED_FILTERING trap – String with the attack information
• STOPPED_FILTERING
–
String with the attack information
–
String with the reason for stopping