Cisco Cisco Packet Data Gateway (PDG) Fehlerbehebungsanleitung
PDG Service Configuration Mode Commands
ip source-violation ▀
Cisco ASR 5000 Series Command Line Interface Reference ▄
OL-22948-01
ip source-violation
Sets the parameters for IP source validation. Source validation is useful if packet spoofing is suspected or for verifying
packet routing and labeling within the network.
packet routing and labeling within the network.
Product
PDG/TTG
Privilege
Security Administrator, Administrator
Syntax
Default: disabled
Configures the service to reset the drop-limit counters upon receipt of a properly addressed packet.
Configures the service to reset the drop-limit counters upon receipt of a properly addressed packet.
Default: 10
Sets the maximum number of allowed IP source violations within the detection period before dropping a call.
If num is not specified, the value is set to the default value.
Sets the maximum number of allowed IP source violations within the detection period before dropping a call.
If num is not specified, the value is set to the default value.
can be any integer value from 1 to 1000000.
Default: 120
Sets the detection period in seconds for IP source violations. If secs is not specified, the value is set to the
default value.
Sets the detection period in seconds for IP source violations. If secs is not specified, the value is set to the
default value.
can be any integer value from 1 to1000000.
Sets or restores the IP source violation detection defaults, as follows:
drop-limit: Sets or restores the maximum number of IP source violations within the detection period before
dropping the call to the default value of 10.
period: Sets or restores the detection period for IP source violations to the default value of 120 seconds.
drop-limit: Sets or restores the maximum number of IP source violations within the detection period before
dropping the call to the default value of 10.
period: Sets or restores the detection period for IP source violations to the default value of 120 seconds.
The drop-limit counters are not reset upon receipt of a properly addressed packet.
Usage
Source validation is useful if packet spoofing is suspected or for verifying packet routing and labeling within
the network.
the network.