Virus Throttling
Configuring and Applying Connection-Rate ACLs
Configuring and Applying Connection-
Rate ACLs
Command
Page
ip access-list connection-rate-filter <
crf-list-name
>
< filter | ignore > ip < any | host <
ip-addr
> |
ip-addr
<
mask
>>
< filter | ignore > < udp | tcp > < source > <
options
>
3-23
vlan <
vid
> ip access-group <
crf-list-name
> connection-rate-filter
A host sending legitimate, routed traffic can trigger connection-rate filtering
in some circumstances. If you can verify that such a host is indeed sending
valid traffic and is not a threat to your network, you may want to configure a
connection-rate ACL (access control list) that allows this traffic to bypass the
configured connection-rate filtering.
A connection-rate Access Control List (ACL) is an optional tool that consists
of one or more explicitly configured Access Control Entries (ACEs) used to
specify whether to enforce the configured connection-rate policy on traffic
from a particular source.
Use of connection-rate ACLs provides the option to apply exceptions to the
configured connection-rate filtering policy. This enables you to allow legiti
mate traffic from a trusted source, and apply connection-rate filtering only to
inbound traffic from untrusted sources. For example, where a connection-rate
policy has been configured, you can apply a connection-rate ACL that causes
the switch bypass connection-rate policy filtering on traffic from:
■
A trusted server exhibiting a relatively high IP connection rate due to
heavy demand
■
A trusted traffic source on the same port as other, untrusted traffic
sources.
The criteria for an exception can include the SA of traffic from a specific host,
group of hosts, or a subnet, and can also include source and destination TCP/
UDP criteria. This allows you to apply a notify-only, throttling, or blocking
policy while allowing exceptions for legitimate traffic from specific sources.
You can also allow exceptions for traffic with specific TCP or UDP criteria.
For more information on when to apply connection-rate ACLs, refer to “Appli
cation Options” on page 3-6.
3-20
Содержание J8697A
Страница 1: ...6200yl Access Security Guide 5400zl 3500yl ProCurve Switches K 11 XX www procurve com ...
Страница 2: ......
Страница 22: ...Product Documentation Feature Index xx ...
Страница 55: ...Configuring Username and Password Security Front Panel Security 2 21 ...
Страница 56: ...Configuring Username and Password Security Front Panel Security 2 22 ...
Страница 58: ...Virus Throttling Contents Operating Notes 3 30 Connection Rate Log and Trap Messages 3 31 3 2 ...
Страница 88: ...Virus Throttling Connection Rate Log and Trap Messages This page is intentionally unused 3 32 ...
Страница 118: ...Web and MAC Authentication Client Status This page intentionally unused 4 30 ...
Страница 230: ...Configuring Secure Socket Layer SSL Common Errors in SSL setup This page is intentionally unused 8 22 ...
Страница 356: ...Configuring and Monitoring Port Security Operating Notes for Port Security 11 44 ...
Страница 370: ...Using Authorized IP Managers Operating Notes This page is intentionally unused 12 14 ...
Страница 388: ...10 Index ...
Страница 389: ......