HP 6600 Security Configuration Manual page 12

Table of Contents

Advertisement

Troubleshooting connection limiting ··························································································································· 464
Connection limit rules with overlapping segments ··························································································· 464
Connection limit rules with overlapping protocol types ·················································································· 464
Configuring web filtering········································································································································ 466
Overview ······································································································································································· 466
URL address filtering ··········································································································································· 466
IP address-supported URL address filtering ······································································································· 466
URL parameter filtering ······································································································································· 467
Java blocking ······················································································································································· 467
ActiveX blocking ·················································································································································· 468
Configuring web filtering ············································································································································ 468
Configuring URL address filtering ······················································································································ 468
Configuring IP address-supported URL address filtering ················································································· 468
Configuring URL parameter filtering ·················································································································· 469
Configuring Java blocking ································································································································· 469
Configuring ActiveX blocking ···························································································································· 470
Displaying and maintaining web filtering ················································································································· 470
URL address filtering configuration example ············································································································· 471
URL parameter filtering configuration example ········································································································ 472
Java blocking configuration example ························································································································ 473
Troubleshooting web filtering ····································································································································· 474
Failed to add filtering entry or suffix keyword due to upper limit ·································································· 474
Invalid characters are present in the configured parameter ··········································································· 475
Invalid use of wildcard ······································································································································· 475
Invalid blocking suffix ········································································································································· 476
ACL configuration failed ····································································································································· 476
Unable to access the HTTP server by IP address······························································································ 477
Configuring attack detection and protection ········································································································ 478
Overview ······································································································································································· 478
Types of network attacks the device can defend against ··············································································· 478
Blacklist function ·················································································································································· 480
Traffic statistics function ······································································································································ 480
TCP proxy ····························································································································································· 481
Attack detection and protection configuration task list ···························································································· 483
Configuring attack protection functions for an interface ························································································· 484
Creating an attack protection policy ················································································································· 484
Configuring an attack protection policy ··········································································································· 484
Applying an attack protection policy to an interface ······················································································ 487
Configuring TCP proxy ················································································································································ 488
Configuring the blacklist function ······························································································································· 488
Enabling traffic statistics on an interface ··················································································································· 489
Displaying and maintaining attack detection and protection ················································································· 489
Attack detection and protection configuration examples ························································································ 490
Attack protection functions on interfaces configuration example ··································································· 490
Blacklist configuration example ························································································································· 492
Traffic statistics configuration example ············································································································· 493
TCP proxy configuration example ····················································································································· 495
Configuring TCP attack protection ························································································································· 497
Overview ······································································································································································· 497
Enabling the SYN Cookie feature ······························································································································ 497
Enabling protection against Naptha attacks ············································································································· 498
Displaying and maintaining TCP attack protection ·································································································· 498
x
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Advertisement

Table of Contents
loading

This manual is also suitable for:

Hsr6600

Table of Contents