Virus Throttling
Configuring and Applying Connection-Rate ACLs
The administrator needs to maintain blocking protection from the “Company
Intranet” while allowing access to the server at 15.45.50.17. Because the server
is carefully maintained as a trusted device, the administrator’s solution is to
configure a connection-rate ACL that causes the switch to ignore (circumvent)
connection-rate filtering for inbound traffic from the server, while maintaining
the filtering for all other inbound routed traffic on port D2.
The configuration steps include:
1. Create the connection-rate ACL with a single entry:
•
Use the IP address of the desired server.
•
Include a CIDR notation of “32” for the ACL mask. (Which means the
mask will allow only traffic whose SA exactly matches the specified
IP address.)
•
The ACL will automatically include the implicit
filter
ACE as the last
entry, which means that any traffic that is not from the desired server
will be subject to filtering by the connection-rate policy configured
on port D2.
2. Assigning the ACL to the VLAN through which traffic from the server
enters the switch.
Enters the connection-
rate ACL context and
names the ACL.
Configures the action to allow traffic from the server at
15.45.50.17 without filtering through the per-port connection-
rate policy configured on port D2.
Assigns the new
ACL to VLAN 15,
where traffic
from the desired
server enters the
switch.
Figure 3-11. Creating and Assigning a Connection Rate ACL
3-28
Summary of Contents for J8697A
Page 1: ...6200yl Access Security Guide 5400zl 3500yl ProCurve Switches K 11 XX www procurve com ...
Page 2: ......
Page 22: ...Product Documentation Feature Index xx ...
Page 55: ...Configuring Username and Password Security Front Panel Security 2 21 ...
Page 56: ...Configuring Username and Password Security Front Panel Security 2 22 ...
Page 58: ...Virus Throttling Contents Operating Notes 3 30 Connection Rate Log and Trap Messages 3 31 3 2 ...
Page 88: ...Virus Throttling Connection Rate Log and Trap Messages This page is intentionally unused 3 32 ...
Page 118: ...Web and MAC Authentication Client Status This page intentionally unused 4 30 ...
Page 356: ...Configuring and Monitoring Port Security Operating Notes for Port Security 11 44 ...
Page 370: ...Using Authorized IP Managers Operating Notes This page is intentionally unused 12 14 ...
Page 388: ...10 Index ...
Page 389: ......