EasyManuals Logo

HP MSR SERIES Command Reference

HP MSR SERIES
684 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #570 background imageLoading...
Page #570 background image
556
ack-flood detect non-specific
client-verify tcp enable
ack-flood detect
Use ack-flood detect to configure IP-specific ACK flood attack detection.
Use undo ack-flood detect to remove the ACK flood attack detection configuration for an IP address.
Syntax
ack-flood detect { ip ip-address | ipv6 ipv6-address } [ vpn-instance vpn-instance-name ] [ threshold
threshold-value ] [ action { client-verify | drop | logging } * ]
undo ack-flood detect { ip ip-address | ipv6 ipv6-address } [ vpn-instance vpn-instance-name ]
Default
ACK flood attack detection is not configured for any IP address.
Views
Attack defense policy view
Predefined user roles
network-admin
Parameters
ip ip-address: Specifies the IPv4 address to be protected. The ip-address argument cannot be all 1s or 0s.
ipv6 ipv6-address: Specifies the IPv6 address to be protected. The ipv6-address argument cannot be a
multicast address or all 0s.
vpn-instance vpn-instance-name: Specifies the MPLS L3VPN instance to which the protected IP address
belongs. The vpn-instance-name argument is a case-sensitive string of 1 to 31 characters. Do not specify
this option if the protected IP address is on the public network.
threshold threshold-value: Sets the threshold for triggering ACK flood attack prevention. The value range
is 1 to 1000000 in units of ACK packets sent to the specified IP address per second.
action: Specifies the actions when an ACK flood attack is detected. If no action is specified, the global
actions set by the ack-flood action command apply.
client-verify: Adds the victim IP addresses to the protected IP list for TCP client verification. To enable the
TCP client verification to provide proxy services, make sure TCP client verification is enabled.
drop: Drops subsequent ACK packets destined for the protected IP address.
logging: Enables logging for ACK flood attack events. The log information records the detection interface,
victim IP address, MPLS L3VPN instance name, current packet statistics, prevention action, and start time
of the attack.
Usage guidelines
You can configure ACK flood attack detection for multiple IP addresses in one attack defense policy.
With ACK flood attack detection configured, the device is in attack detection state. An attack occurs
when the device detects that the sending rate of ACK packets to a protected IP address reaches or
exceeds the threshold. The device enters prevention state and takes actions to protect the target IP
address. When the rate is below the silence threshold (three-fourths of the threshold), the device
considers that the threat is over and returns to the attack detection state.

Table of Contents

Other manuals for HP MSR SERIES

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the HP MSR SERIES and is the answer not in the manual?

HP MSR SERIES Specifications

General IconGeneral
Product SeriesMSR Series
ManufacturerHP
CategoryNetwork Router
PortsVaries by model
WAN InterfacesVaries by model
LAN InterfacesVaries by model
VPN SupportYes
FirewallYes
DimensionsVaries by model
WeightVaries by model
Wireless SupportVaries by model
ManagementWeb-based, CLI
Power SupplyVaries by model
Operating Temperature0°C to 45°C
Storage Temperature-40°C to 70°C
Humidity5% to 95% non-condensing

Related product manuals