420
Step Command Remarks
5. Configure the action and
silence thresholds for UDP
flood attack protection for a
specific IP address.
defense udp-flood ip
ip-address
rate-threshold high
rate-number
[
low
rate-number ]
Optional.
Not configured by default.
6. Configure the device to
drop UDP flood attack
packets.
defense udp-flood action
drop-packet
Optional.
By default, the device only outputs
alarm logs if detecting an attack.
Applying an attack protection policy to an interface
To make a configured attack protection policy take effect, you need to apply the policy to a specific
interface.
To apply an attack protection policy to an interface:
Step Command Remarks
1. Enter system view.
system-view
N/A
2. Enter interface view.
interface
interface-type
interface-number
N/A
3. Apply an attack protection
policy to the interface.
attack-defense apply policy
policy-number
By default, no attack protection
policy is applied to any interface.
The attack protection policy to be
applied to an interface must already
exist.
Configuring the blacklist function
You can configure a device to filter packets from certain IP addresses by configuring the blacklist
function.
The blacklist configuration includes enabling the blacklist function and adding blacklist entries. When
adding a blacklist entry, you can also configure the entry aging time. If you do not configure the aging
time, the entry never ages out, and always exist until you delete it manually.
To configure the blacklist function:
Step Command Remarks
1. Enter system view.
system-view
N/A
2. Enable the blacklist function.
blacklist enable
Disabled by default.
3. Add a blacklist entry.
blacklist ip
source-ip-address
[
timeout
minutes ]
Optional.
The scanning attack protection
function can add blacklist entries
automatically.
You can add blacklist entries manually, or configure the device to automatically add the IP addresses
of detected scanning attackers to the blacklist. For the latter purpose, enable the blacklist function for
the device, the scanning attack protection function, and the blacklist function for scanning attack
protection. The blacklist entries added by the scanning attack protection function will be aged after