Creating an attack protection policy – H3C Technologies H3C SecBlade LB Cards User Manual
Page 255

244
Configuring attack detection and protection at the
CLI
Attack detection and protection configuration task list
•
Configure attack protection functions for a security zone. To do so, you need to create an attack
protection policy, configure the required attack protection functions (such as Smurf attack protection,
scanning attack protection, and flood attack protection) in the policy, and then apply the policy to
the security zone. There is no specific configuration order for the attack functions, and you can
configure them as needed.
•
Configure a TCP proxy when the SYN flood attack protection policy specifies the processing
method for SYN flood attack packets as TCP proxy.
•
Configure the blacklist function. This function can be used independently or used in conjunction
with the scanning attack protection function on a security zone.
•
Enable the traffic statistics function. This function can be used independently.
Complete the following tasks to configure attack detection and protection:
Task Remarks
Configuring attack
protection functions for
a security zone
Creating an attack protection policy
Required.
Enabling attack protection logging
Optional.
Configuring an attack protection policy
Configuring a single-packet attack protection policy
Configuring a scanning attack protection policy
Configuring a flood attack protection policy
Required.
Configure one or more
policies as needed.
Applying an attack protection policy to a security
zone
Required.
Optional.
Configuring the blacklist function
Optional.
Optional.
Creating an attack protection policy
Before configuring attack protection functions for a security zone, you need to create an attack protection
policy and enter its view. In attack protection policy view, you can define one or more signatures used for
attack detection and specify the corresponding protection measures.
When creating an attack protection policy, you can also specify a security zone so that the security zone
uses the policy exclusively.
To create an attack protection policy:
Step Command
Remarks
1.
Enter system view.
system-view
N/A