Configuring tcp proxy – H3C Technologies H3C SecBlade LB Cards User Manual
Page 260

249
Step Command
Remarks
2.
Enter VD system view.
switchto vd vd-name
Required for a non-default VD.
3.
Enter attack protection
policy view.
attack-defense policy
policy-number
N/A
4.
Enable DNS flood attack
protection.
defense dns-flood enable
Disabled by default.
5.
Configure the global action
and silence thresholds for
DNS flood attack protection.
defense dns-flood rate-threshold
high rate-number [ low
rate-number ]
Optional.
By default, the action threshold is
1000 packets per second and the
silence threshold is 750 packets per
second.
6.
Configure the action and
silence thresholds for DNS
flood attack protection of a
specific IP address.
defense dns-flood ip ip-address
rate-threshold high rate-number
[ low rate-number ]
Optional.
Not specifically configured for an IP
address by default.
Applying an attack protection policy to a security zone
To make a configured attack protection policy take effect, you need to apply the policy to a specific
security zone.
To apply an attack protection policy to a security zone:
Step Command
Remarks
1.
Enter system view.
system-view
N/A
2.
Enter VD system view.
switchto vd vd-name
Required for a non-default VD.
3.
Enter security zone view.
zone name zone-name id zone-id N/A
4.
Apply an attack protection
policy to the security zone.
attack-defense apply policy
policy-number
By default, no attack protection
policy is applied to any security
zone.
The attack protection policy to be
applied to a security zone must
already exist.
Configuring TCP proxy
Usually, TCP proxy is used on a device's security zones connected to external networks to protect internal
servers from SYN flood attacks. When detecting a SYN flood attack, the device can take protection
actions as configured by using the defense syn-flood action command. If the trigger-tcp-proxy keyword
is specified for the defense syn-flood action command, the device starts TCP proxy in the specified mode
to inspect and process subsequent TCP connection requests destined to the protected IP address. The
protected IP address can be configured manually or generated dynamically by SYN flood attack
detection.
To configure the TCP proxy function: