10-22
Cisco SCE8000 Software Configuration Guide, Rel 3.1.6S
OL-16479-01
Chapter 10 Identifying and Preventing Distributed-Denial-Of-Service Attacks
Monitoring Attack Filtering
• 'protocol'
–
TCP
–
UDP
–
ICMP
–
other
• 'rate1' and 'rate2' are numbers
• 'duration' is a number.
• 'total-flows' is one of the following strings, depending on the attack action:
–
If 'action' is block: 'number' flows blocked.
–
If 'action' is report: attack comprised of 'number' flows.
• 'hw-filter'
–
If the attack was not filtered by a hardware filter: empty string
–
If the attack was filtered by a hardware filter: HW filters used, actual attack duration is probably
smaller than reported above, actual amount of flows handled is probably larger than reported
above.
Monitoring Attack Filtering Using CLI Commands
• How to display a specified attack detector configuration, page 10-23
• How to display the default attack detector configuration, page 10-24
• How to display all attack detector configurations, page 10-25
• How to display filter state (enabled or disabled), page 10-25
• How to display configured threshold values and actions, page 10-25
• How to display the current counters, page 10-27
• How to display all currently handled attacks, page 10-27
• How to display all existing force-filter settings, page 10-27
• How to display all existing don't-filter settings, page 10-27
• How to display the list of ports selected for subscriber notification, page 10-27
• How to find out whether hardware attack filtering has been activated, page 10-28
Use these commands to monitor attack detection and filtering:
• show interface linecard 0 attack-detector
• show interface linecard 0 attack-filter
• show interface linecard 0 attack-filter query
• show interface linecard 0 attack-filter current-attacks
• show interface linecard 0 attack-filter don't-filter
• show interface linecard 0 attack-filter force-filter
• show interface linecard 0 attack-filter subscriber-notification ports