3-21
Virus Throttling (Connection-Rate Filtering)
Configuring and Applying Connection-Rate ACLs
Configuring a Connection-Rate ACL Using UDP/TCP
Criteria
(To configure a connection-rate ACL using source IP address criteria, refer
to page 3-19.)
Syntax:
ip access-list connection-rate-filter <
crf-list-name
>
Creates a connection-rate-filter ACL and puts the CLI
into the access control entry (ACE) context:
HP Switch(config-crf-nacl)#
If the ACL already exists, this command simply puts
the CLI into the ACE context.
Syntax:
< filter | ignore > < udp | tcp > < any >
< filter | ignore > < udp | tcp > < host <
ip-addr
> > [
udp/tcp
-
options
]
< filter | ignore > < udp | tcp > <
ip-addr
<
mask-length
> [
udp/tcp
-
options
]
Used in the ACE context (above) to specify the action
of the connection-rate ACE (filter or ignore), and the
UDP/TCP criteria and SA of the IP traffic that the ACE
affects.
< filter | ignore >
filter:
This option assigns a policy of filtering (drop-
ping) IP traffic having an SA that matches the source
address criteria in the ACE.
ignore:
This option specifies a policy of allowing IP
traffic having an SA that matches the source address
criteria in the ACE.
< udp | tcp > < any | host <
ip-addr
> |
ip-addr
<
mask-length
>>
Applies the filter or ignore action to either TCP pack-
ets or UDP packets having the specified SA.
any:
Applies the ACEs action (
filter
or
ignore
) to IP
traffic having any SA
.
host <
ip-addr
>
:
Applies the ACEs action (
filter
or
ignore
) to IP traffic having the specified host SA
.
Summary of Contents for E3800 Series
Page 2: ......
Page 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Page 30: ...xxviii ...
Page 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Page 186: ...4 72 Web and MAC Authentication Client Status ...
Page 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Page 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Page 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Page 730: ...20 Index ...
Page 731: ......