557
Examples
# Configure ACK flood attack detection for 192.168.1.2 in attack defense policy atk-policy-1.
<Sysname> system-view
[Sysname] attack-defense policy atk-policy-1
[Sysname-attack-defense-policy-atk-policy-1] ack-flood detect ip 192.168.1.2 threshold
2000
Related commands
• ack-flood action
• ack-flood detect non-specific
• ack-flood threshold
• client-verify tcp enable
ack-flood detect non-specific
Use ack-flood detect non-specific to enable ACK flood attack detection for non-specific IP addresses.
Use undo ack-flood detect non-specific to restore the default.
Syntax
ack-flood detect non-specific
undo ack-flood detect non-specific
Default
ACK flood attack detection is not enabled for non-specific IP addresses.
Views
Attack defense policy view
Predefined user roles
network-admin
Usage guidelines
This command enables global ACK flood attack detection. It applies to all IP addresses except those
specified by the ack-flood detect command. The system uses the global trigger threshold set by the
ack-flood threshold command and global actions specified by the ack-flood action command.
Examples
# Enable ACK flood attack detection for non-specific IP addresses in attack defense policy atk-policy-1.
<Sysname> system-view
[Sysname] attack-defense policy atk-policy-1
[Sysname-attack-defense-policy-atk-policy-1] ack-flood detect non-specific
Related commands
• ack-flood action
• ack-flood detect
• ack-flood threshold