Configuring udp flood detection – H3C Technologies H3C SecBlade LB Cards User Manual
Page 233
222
Table 26 Configuration items
Item Description
Protected Host
Configuration
IP Address
Specify the IP address of the protected host.
Action
Threshold
Set the protection action threshold for
ICMP flood attacks that target the
protected host.
If the sending rate of ICMP packets
destined for the specified IP address
constantly reaches or exceeds this
threshold, the device enters the attack
protection state and takes attack
protection actions as configured.
By default, the action
threshold is 1000 packets
per second and the silent
threshold is 750 packets
per second.
Silent
Threshold
Set the silent threshold for actions that
protect against ICMP flood attacks
targeting the protected host.
If the sending rate of ICMP packets
destined for the specified IP address
drops below this threshold, the device
returns to the attack detection state and
stops the protection actions.
Global
Configuration of
Security Zone
Action
Threshold
Set the protection action threshold for
ICMP flood attacks that target a host in the
protected security zone.
If the sending rate of ICMP packets
destined for a host in the security zone
constantly reaches or exceeds this
threshold, the device enters the attack
protection state and takes attack
protection actions as configured.
By default, the action
threshold is 1000 packets
per second and the silent
threshold is 750 packets
per second.
Silent
Threshold
Set the silent threshold for actions that
protect against ICMP flood attacks
targeting a host in the protected security
zone.
If the sending rate of ICMP packets
destined for a host in the security zone
drops below this threshold, the device
returns to the attack detection state and
stops the protection actions.
NOTE:
Host-specific settings take precedence over the global settings for security zones.
Configuring UDP flood detection
UDP flood detection is mainly intended to protect servers and is usually configured for an internal zone.
1.
From the navigation tree, select Security > Intrusion Detection > UDP Flood.
The UDP flood detection configuration page appears.