EasyManuals Logo

Juniper SYSTEM BASICS - CONFIGURATION GUIDE V 11.1.X User Manual

Juniper SYSTEM BASICS - CONFIGURATION GUIDE V 11.1.X
640 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #485 background imageLoading...
Page #485 background image
suspicious-control-flow-detection off
â–  Use to turn off the suspicious control flow detection.
â–  Example
host1(config)#suspicious-control-flow-detection off
â–  Use the no version to turn on suspicious control flow detection, which is the
default.
â–  See suspicious-control-flow-detection off.
suspicious-control-flow-detection protocol backoff-time
â–  Use to set the backoff time in seconds for a specific protocol that triggers the
suspicious flow to return to a nonsuspicious state.
â–  When set to zero, a suspicious control flow for a protocol does not return to a
nonsuspicious state using a time mechanism.
â–  Example
host1(config)#suspicious-control-flow-detection protocol iposi backoff-time 300
â–  Use the no version to restore the defaults for the protocol, 300 seconds.
â–  See suspicious-control-flow-detection protocol backoff-time.
suspicious-control-flow-detection protocol low-threshold
â–  Use to set a threshold for a specific protocol; if the flow rate falls below this rate,
a suspicious flow changes to the nonsuspicious state.
â–  Low threshold is the rate in packets per second at which a suspicious flow
becomes no longer suspicious.
â–  When set to zero, a suspicious flow cannot change to the nonsuspicious state by
means of a low threshold rate. To clear this flow, you must use the clear
suspicious-control-flow-detection command.
â–  Example
host1(config)#suspicious-control-flow-detection protocol iposi low-threshold 512
â–  Use the no version to restore the defaults for the protocol.
â–  See suspicious-control-flow-detection protocol low-threshold.
suspicious-control-flow-detection protocol threshold
â–  Use to set the threshold in packets per second for a specific protocol, which
triggers the flow to become a suspicious flow.
â–  When set to zero, a suspicious flow cannot change to the nonsuspicious state
via a threshold rate.
â–  Example
host1(config)#suspicious-control-flow-detection protocol iposi threshold 1024
Denial of Service (DoS) Protection â–  455
Chapter 7: Passwords and Security

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Juniper SYSTEM BASICS - CONFIGURATION GUIDE V 11.1.X and is the answer not in the manual?

Juniper SYSTEM BASICS - CONFIGURATION GUIDE V 11.1.X Specifications

General IconGeneral
BrandJuniper
ModelSYSTEM BASICS - CONFIGURATION GUIDE V 11.1.X
CategorySoftware
LanguageEnglish

Related product manuals