3-26
Virus Throttling (Connection-Rate Filtering)
Configuring and Applying Connection-Rate ACLs
configure a connection-rate ACL that causes the switch to ignore (circumvent)
connection-rate filtering for inbound traffic from the server, while maintaining
the filtering for all other inbound traffic on port D2.
The configuration steps include:
1.
Create the connection-rate ACL with a single entry:
•
Use the IP address of the desired server.
•
Include a CIDR notation of “32” for the ACL mask. (Which means the
mask will allow only traffic whose source IP address (SA) exactly
matches the specified IP address.)
•
The ACL will automatically include the implicit
filter
ACE as the last
entry, which means that any traffic that is not from the desired server
will be subject to filtering by the connection-rate policy configured
on port D2.
2.
Assigning the ACL to the VLAN through which traffic from the server
enters the switch.
Figure 3-9. Creating and Assigning a Connection Rate ACL
Enters the connection-
rate ACL context and
names the ACL.
Configures the action to allow traffic from the server at
15.45.50.17 without filtering through the per-port connection-
rate policy configured on port 22.
Assigns the new
ACL to VLAN 15,
where traffic
from the desired
server enters the
switch.
Содержание E3800 Series
Страница 1: ...HP Switch Software E3800 switches Software version KA 15 03 September 2011 Access Security Guide ...
Страница 2: ......
Страница 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Страница 30: ...xxviii ...
Страница 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Страница 186: ...4 72 Web and MAC Authentication Client Status ...
Страница 290: ...6 74 RADIUS Authentication Authorization and Accounting Dynamic Removal of Authentication Limits ...
Страница 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Страница 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Страница 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Страница 659: ...14 11 Configuring and Monitoring Port Security Port Security Figure 14 5 Examples of Show Mac Address Outputs ...
Страница 730: ...20 Index ...
Страница 731: ......