最佳答案
attack-defense policy AtkInterface2 scan detect level high action logging syn-flood detect non-specific syn-flood action logging drop udp-flood detect non-specific udp-flood action logging drop icmp-flood detect non-specific icmp-flood action logging drop signature detect smurf action drop logging signature detect large-icmp action drop logging signature detect large-icmpv6 action drop logging signature detect tcp-invalid-flags action drop logging signature detect tcp-null-flag action drop logging signature detect tcp-all-flags action drop logging signature detect tcp-syn-fin action drop logging signature detect tcp-fin-only action drop logging signature detect land action drop logging signature detect winnuke action drop logging signature detect fraggle action drop logging signature detect ip-option record-route action drop logging signature detect ip-option strict-source-routing action drop logging signature detect icmp-type destination-unreachable action drop logging signature detect icmp-type redirect action drop logging 只有这些策略,其他一律放行
(0)
暂无评论
亲~登录后才可以操作哦!
确定你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作
举报
×
侵犯我的权益
×
侵犯了我企业的权益
×
抄袭了我的内容
×
原文链接或出处
诽谤我
×
对根叔社区有害的内容
×
不规范转载
×
举报说明
暂无评论