Configuration of SIP flood attack defense for the USG2000&5000 series on the CLI

20

You can configure SIP flood attack defense for the USG2000&5000 series on the CLI.
1. In the user view, run the system-view command to access the system view.
2. Run the firewall defend sip-flood enable command to enable the SIP flood attack defense function.
3. According to the attack defense scope, run either of the following commands to set SIP flood attack parameters:
(a) Run the firewall defend sip-flood ip ip-address [ vpn-instance vpn-instance-name ] [ alert-rate alert-rate ] [ max-rate rate-number ] [ source-detect [ on | off ] ] command to set SIP flood attack defense parameters based on IP addresses. The source detection function is enabled by default.
(b) Run the firewall defend sip-flood zone [ vpn-instance vpn-instance-name ] zone-name [ alert-rate alert-rate ] [ max-rate rate-number ] [ source-detect [ on | off ] ] command to set SIP flood attack defense parameters based on security zones. The source detection function is enabled by default.
4. Run the firewall defend sip-flood port range [start-port end-port ] command to set a port range for SIP flood attack defense.

Other related questions:
Configuration of SIP flood attack defense for the USG2000&5000 series on the web UI
You can configure SIP flood attack defense for the USG2000&5000 series on the web UI. Configure SIP flood attack defense based on IP addresses. 1. Choose Firewall > Security Protection > Attack Defense. 2. In the attack defense configuration list, choose Attack Defense Type > Application Layer > SIP Flood. 3. On the Configure SIP Flood Attack Defense page, select Enable corresponding to Defense. 4. Set a port range. 5. Click Add. Enter an IP address in the IP Address text box. 6. Click Apply. Configure SIP flood attack defense based on security zones. 1. Choose Firewall > Security Protection > Attack Defense. 2. In the attack defense configuration list, choose Attack Defense Type > Application Layer > SIP Flood. 3. On the Configure SIP Flood Attack Defense page, select Enable corresponding to Defense. 4. Set a port range. 5. Click the (Optional) Based on Security Zones tab. 6. Click Add. Select a security zone from the Security Zone drop-down list. 7. Click Apply.

Whether the USG2000&5000 series supports SIP flood attack defense
The USG2000&5000 supports SIP flood attack defense based on IP addresses and security zones.

Configuration of SIP flood attack defense for the USG6000 series on the CLI
You can configure SIP flood attack defense for the USG6000 series on the CLI. Run the anti-ddos sip-flood source-detect [ alert-rate alert-rate ] command to enable SIP flood attack defense.

Configuration of IP sweep attack defense for the USG2000&5000 series on the CLI
You can configure IP sweep attack defense for the USG2000&5000 series on the CLI. 1. Run the firewall defend ip-sweep enable command to enable IP sweep attack defense. By default, IP sweep attack defense is disabled. 2. Run the firewall defend ip-sweep max-rate max-rate-number command to set the IP sweep maximum connection rate. The default maximum connection rate is 4000 pps. 3. Run the firewall defend ip-sweep blacklist-timeout interval command to set the blacklist aging time. By default, the blacklist aging time is 20 minutes. 4. Run the firewall blacklist enable command to enable the blacklist function. After IP sweep attack defense is enabled, the device checks received TCP, UDP, and ICMP packets. If the number of packets that a source address sends per second to different destination IP addresses exceeds the specified threshold, the USG2000&5000 considers that the source address is initiating an IP sweep attack. It blacklists the IP address and: Discards the packets from the source address if the blacklist function is enabled. Forwards the packets from the source address and generates an alarm if the blacklist function is disabled.

Configuration of SIP flood attack defense for the USG6000 series on the web UI
You can configure SIP flood attack defense for the USG6000 series on the web UI. 1. Choose Policy > Security Protection > Attack Defense > Anti-DDoS. 2. On the DDoS page, select Enable corresponding to SIP Flood.

If you have more questions, you can seek help from following ways:
To iKnow To Live Chat
Scroll to top