3-17
Virus Throttling (Connection-Rate Filtering)
Configuring and Applying Connection-Rate ACLs
Configuring and Applying
Connection-Rate ACLs
A host sending legitimate traffic can trigger connection-rate filtering in some
circumstances. If you can verify that such a host is indeed sending valid traffic
and is not a threat to your network, you may want to configure a connection-
rate ACL (access control list) that allows this traffic to bypass the configured
connection-rate filtering.
A connection-rate Access Control List (ACL) is an optional tool that consists
of one or more explicitly configured Access Control Entries (ACEs) used to
specify whether to enforce the configured connection-rate policy on traffic
from a particular source.
Use of connection-rate ACLs provides the option to apply exceptions to the
configured connection-rate filtering policy. This enables you to allow legiti-
mate traffic from a trusted source, and apply connection-rate filtering only to
inbound traffic from untrusted sources. For example, where a connection-rate
policy has been configured, you can apply a connection-rate ACL that causes
the switch bypass connection-rate policy filtering on traffic from:
■
A trusted server exhibiting a relatively high IP connection rate due to
heavy demand
■
A trusted traffic source on the same port as other, untrusted traffic
sources.
The criteria for an exception can include the source IP address of traffic from
a specific host, group of hosts, or a subnet, and can also include source and
destination TCP/UDP criteria. This allows you to apply a notify-only, throt-
tling, or blocking policy while allowing exceptions for legitimate traffic from
specific sources. You can also allow exceptions for traffic with specific TCP
or UDP criteria.
Command
Page
ip access-list connection-rate-filter <
crf-list-name
>
< filter | ignore > ip < any | host <
ip-addr
> |
ip-addr
<
mask
>>
< filter | ignore > < udp | tcp > < source > <
options
>
vlan <
vid
> ip access-group <
crf-list-name
> connection-rate-filter
Summary of Contents for E3800 Series
Page 2: ......
Page 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Page 30: ...xxviii ...
Page 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Page 186: ...4 72 Web and MAC Authentication Client Status ...
Page 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Page 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Page 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Page 730: ...20 Index ...
Page 731: ......