3-18
Virus Throttling (Connection-Rate Filtering)
Configuring and Applying Connection-Rate ACLs
Configuring and Applying
Connection-Rate ACLs
A host sending legitimate traffic can trigger connection-rate filtering in some
circumstances. If you can verify that such a host is indeed sending valid traffic
and is not a threat to your network, you may want to configure a connection-
rate ACL (access control list) that allows this traffic to bypass the configured
connection-rate filtering.
A connection-rate Access Control List (ACL) is an optional tool that consists
of one or more explicitly configured Access Control Entries (ACEs) used to
specify whether to enforce the configured connection-rate policy on traffic
from a particular source.
Use of connection-rate ACLs provides the option to apply exceptions to the
configured connection-rate filtering policy. This enables you to allow legiti-
mate traffic from a trusted source, and apply connection-rate filtering only to
inbound traffic from untrusted sources. For example, where a connection-rate
policy has been configured, you can apply a connection-rate ACL that causes
the switch bypass connection-rate policy filtering on traffic from:
■
A trusted server exhibiting a relatively high IP connection rate due to
heavy demand
■
A trusted traffic source on the same port as other, untrusted traffic
sources.
The criteria for an exception can include the source IP address of traffic from
a specific host, group of hosts, or a subnet, and can also include source and
destination TCP/UDP criteria. This allows you to apply a notify-only, throt-
tling, or blocking policy while allowing exceptions for legitimate traffic from
specific sources. You can also allow exceptions for traffic with specific TCP
or UDP criteria.
Command
Page
ip access-list connection-rate-filter <
crf-list-name
>
< filter | ignore > ip < any | host <
ip-addr
> |
ip-addr
<
mask
>>
< filter | ignore > < udp | tcp > < source > <
options
>
vlan <
vid
> ip access-group <
crf-list-name
> connection-rate-filter
Содержание HP ProCurve Series 6600
Страница 2: ......
Страница 6: ...iv ...
Страница 26: ...xxiv ...
Страница 102: ...2 48 Configuring Username and Password Security Password Recovery ...
Страница 204: ...4 72 Web and MAC Authentication Client Status ...
Страница 550: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Страница 612: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Страница 734: ...14 44 Configuring and Monitoring Port Security Operating Notes for Port Security ...
Страница 756: ...16 8 Key Management System Configuring Key Chain Management ...
Страница 776: ...20 Index web server proxy 14 42 webagent access 6 6 wildcard See ACL wildcard See ACL ...
Страница 777: ......