HP A6600 Configuration Manual page 11

Hide thumbs Also See for A6600:
Table of Contents

Advertisement

Invalid characters are present in the configured parameter ··········································································· 383
Invalid use of wildcard ······································································································································· 384
Invalid blocking suffix ········································································································································· 385
ACL configuration failed ····································································································································· 385
Unable to access the HTTP server by IP address ····························································································· 385
Configuring attack detection and protection ········································································································ 386
Types of network attacks the device can defend against ··············································································· 386
Blacklist function ·················································································································································· 388
Traffic statistics function ······································································································································ 388
TCP proxy ····························································································································································· 389
Configuration task list ·················································································································································· 391
Configuring attack protection functions for an interface ························································································· 392
Creating an attack protection policy ················································································································· 392
Configuring an attack protection policy ··········································································································· 392
Applying an attack protection policy to an interface ······················································································ 396
Configuring TCP proxy ················································································································································ 396
Configuring the blacklist function ······························································································································· 396
Enabling traffic statistics on an interface ··················································································································· 397
Displaying and maintaining attack detection and protection ················································································· 398
Attack detection and protection configuration examples ························································································ 399
Configuring attack protection functions on interfaces ····················································································· 399
Configuring the blacklist function ······················································································································ 400
Configuring traffic statistics ································································································································ 401
Configuring TCP proxy ······································································································································· 403
Configuring TCP and ICMP attack protection ······································································································· 405
Enabling the SYN cookie feature ······························································································································· 405
Enabling Naptha attack protection ···························································································································· 406
Displaying and maintaining TCP and ICMP attack protection ················································································ 406
Configuring IP source guard ·································································································································· 407
Binding entry types ·············································································································································· 407
Configuring IPv4 source guard binding ···················································································································· 408
Configuring a static IPv4 source guard binding entry ···················································································· 408
Configuring the dynamic IPv4 source guard binding function ······································································· 409
Displaying and maintaining IP source guard ············································································································ 409
IP source guard configuration examples ··················································································································· 410
Static IPv4 source guard binding entry configuration example ····································································· 410
Dynamic IPv4 source guard binding by DHCP snooping configuration example ······································· 411
Dynamic IPv4 source guard binding by DHCP relay configuration example ·············································· 413
Troubleshooting IP source guard ································································································································ 414
Binding entries and function cannot be configured ························································································· 414
Configuring ARP attack protection························································································································· 415
Configuration task list ·················································································································································· 415
Configuring ARP defense against IP packet attacks ································································································· 416
Configuring ARP source suppression ················································································································ 416
Enabling ARP black hole routing ······················································································································· 416
Displaying and maintaining ARP defense against IP packet attacks ····························································· 416
ARP defense against IP packet attack configuration example ········································································ 417
Configuring ARP packet rate limit ······························································································································ 418
Configuring ARP packet source MAC address consistency check ········································································· 418
Configuration procedure ···································································································································· 418
Configuring ARP active acknowledgement ··············································································································· 419
Configuration procedure ···································································································································· 419
Configuring authorized ARP ······································································································································· 419
xi

Advertisement

Table of Contents
loading

Table of Contents