3-26
Virus Throttling (Connection-Rate Filtering)
Configuring and Applying Connection-Rate ACLs
For more on ACE masks, refer to “How an ACE Uses a Mask To Screen Packets
for Matches” on page 10-35.
Example of Using an ACL in a Connection-Rate
Configuration
This example adds connection-rate ACLs to the basic example on page 3-12.
Figure 3-10. Sample Network
In the basic example on page 3-12, the administrator configured connection-
rate blocking on port D2. However:
■
The administrator has elevated the connection-rate sensitivity to
high.
■
The server at IP address 15.45.50.17 frequently transmits a relatively
high rate of legitimate connection requests, which now triggers
connection-rate blocking of the server’s IP address on port D2. This
causes periodic, unnecessary blocking of access to the server.
The administrator needs to maintain blocking protection from the “Company
Intranet” while allowing access to the server at 15.45.50.17. Because the server
is carefully maintained as a trusted device, the administrator’s solution is to
Server
Company
Intranet
VLAN 1
15.45.100.1
VLAN 10
15.45.200.1
HP Switch
Server
VLAN 15
15.45.300.1
Switch
Server
Server
Switch
Switch
A
B
C
D
E
H
F
G
B1
B2
B3
B9
B4
D1
D2
IP Address:
15.45.100.7
IP Address: 15.45.50.17
Содержание HP ProCurve Series 6600
Страница 2: ......
Страница 6: ...iv ...
Страница 26: ...xxiv ...
Страница 102: ...2 48 Configuring Username and Password Security Password Recovery ...
Страница 204: ...4 72 Web and MAC Authentication Client Status ...
Страница 550: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Страница 612: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Страница 734: ...14 44 Configuring and Monitoring Port Security Operating Notes for Port Security ...
Страница 756: ...16 8 Key Management System Configuring Key Chain Management ...
Страница 776: ...20 Index web server proxy 14 42 webagent access 6 6 wildcard See ACL wildcard See ACL ...
Страница 777: ......