3-20
Virus Throttling (Connection-Rate Filtering)
Configuring and Applying Connection-Rate ACLs
< filter | ignore >
The
filter
option assigns policy filtering to traffic with
source IP address (SA) matching the source address in the
ACE. The
ignore
option specifies bypassing policy filtering
for traffic with an SA that matches the source address in
the ACE.
ip < any | host <
ip-addr
> |
ip-addr
<
mask-length
>
Specifies the SA criteria for traffic addressed by the ACE.
any:
Applies the ACEs action (
filter
or
ignore
) to traffic
having any SA
.
host <
ip-addr
>
:
Applies the ACEs action (
filter
or
ignore
)
to traffic having the specified host SA
.
ip-addr
<
mask-length
>:
Applies the ACEs action (
filter
or
ignore
) to traffic having an SA
within the range defined
by either:
< src-ip-addr/cidr-mask-bits>
or
< src-ip-addr < mask >>
Use this criterion for traffic received from either a subnet
or a group of IP addresses. The mask can be in either
dotted-decimal format or CIDR format with the number
of significant bits. Refer to “Using CIDR Notation To
Enter the ACE Mask” on page 3-24.
Summary of Contents for E3800 Series
Page 2: ......
Page 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Page 30: ...xxviii ...
Page 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Page 186: ...4 72 Web and MAC Authentication Client Status ...
Page 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Page 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Page 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Page 730: ...20 Index ...
Page 731: ......