How To Display All Attack Detector Configurations; How To Display Filter State (Enabled Or Disabled); How To Display Configured Threshold Values And Actions - Cisco SCE8000 Configuration Manual

Service control engine
Table of Contents

Advertisement

Chapter 10
Identifying and Preventing Distributed-Denial-Of-Service Attacks
other
other
other
other
SCE#>

How to display all attack detector configurations

From the SCE> prompt, type show interface linecard 0 attack-detector all and press Enter.
Step 1

How to display filter state (enabled or disabled)

From the SCE> prompt, type show interface linecard 0 attack-filter and press Enter.
Step 1
Example
SCE>show interface LineCard 0 attack-filter
Enabled state:
------------------
Protocol
----------|------------|------------
TCP
TCP
TCP
TCP+port
TCP+port
TCP+port
UDP
UDP
UDP
UDP+port
UDP+port
UDP+port
ICMP
ICMP
other
other
SCE#>

How to display configured threshold values and actions

Use this command to display the configured threshold values and actions a specified IP address (and
port), taking into account the various specific attack detector access list configurations
Options
In addition to the attack detector options described above, the following options are available:
OL-16479-01
|net.|source-only||Report|
|net.|dest-only
||Report|
|sub.|source-only||Report|
|sub.|dest-only
||Report|
|Direction
|State
|source-only |enabled
|dest-only
|enabled
|dest+source |enabled
|source-only |enabled
|dest-only
|enabled
|dest+source |enabled
|source-only |enabled
|dest-only
|enabled
|dest+source |enabled
|source-only |enabled
|dest-only
|enabled
|dest+source |enabled
|source-only |enabled
|dest-only
|enabled
|source-only |enabled
|dest-only
|enabled
ip-address — the IP address for which to display information.
If attack -direction is dual-sided, an IP address must be configured for both the source
(source-ip-address) and the destination (dest-ip-address) sides.
portnumber — the port number for which to display information.
500|
250|50
500|
250|50
500|
250|50
500|
250|50
Cisco SCE8000 Software Configuration Guide, Rel 3.1.6S
Monitoring Attack Filtering
|No
|No
|No
|No
|No
|No
|No
|No
10-25

Advertisement

Table of Contents
loading

Table of Contents