3-25
Virus Throttling (Connection-Rate Filtering)
Configuring and Applying Connection-Rate ACLs
For more on ACE masks, refer to “How an ACE Uses a Mask To Screen Packets
for Matches” on page 10-35.
Example of Using an ACL in a Connection-Rate
Configuration
This example adds connection-rate ACLs to the basic example on page 3-12.
Figure 3-8. Sample Network
In the basic example on page 3-12, the administrator configured connection-
rate blocking on port D2. However:
■
The administrator has elevated the connection-rate sensitivity to
high.
■
The server at IP address 15.45.50.17 frequently transmits a relatively
high rate of legitimate connection requests, which now triggers
connection-rate blocking of the server’s IP address on port D2. This
causes periodic, unnecessary blocking of access to the server.
The administrator needs to maintain blocking protection from the “Company
Intranet” while allowing access to the server at 15.45.50.17. Because the server
is carefully maintained as a trusted device, the administrator’s solution is to
Server
Company
Intranet
VLAN 1
15.45.100.1
VLAN 10
15.45.200.1
HP Switch
Server
VLAN 15
15.45.300.1
Switch
Server
Server
Switch
Switch
A
B
C
D
E
H
F
G
B10
B11
B12
B19
B13
D21
D22
IP Address:
15.45.100.7
IP Address: 15.45.50.17
Summary of Contents for E3800 Series
Page 2: ......
Page 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Page 30: ...xxviii ...
Page 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Page 186: ...4 72 Web and MAC Authentication Client Status ...
Page 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Page 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Page 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Page 730: ...20 Index ...
Page 731: ......