Attack Protection Configuration Examples; Attack Protection Configuration Example For Msr900/20-1X - HP MSR SERIES Configuration Manual

Hide thumbs Also See for MSR SERIES:
Table of Contents

Advertisement

Figure 163 Add an intrusion detection policy

Attack protection configuration examples

Attack protection configuration example for MSR900/20-1X

Network requirements
As shown in
network security requirements are as follows:
Router always drops packets from Host D, an attacker.
Router denies packets from Host C for 50 minutes for temporary access control of Host C.
Router provides scanning attack protection and automatically adds detected attackers to the
blacklist.
Router provides Land attack protection and Smurf attack protection.
Figure
164, internal users Host A, Host B, and Host C access the Internet through Router. The
164

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents