ProCurve 6200yl User's Guide Page 68

  • Download
  • Add to my manuals
  • Print
  • Page
    / 596
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 67
3-8
Virus Throttling
General Configuration Guidelines
General Configuration Guidelines
As stated earlier, connection-rate filtering is triggered only by inbound IP
traffic generating a relatively high number of new IP connection requests from
the same host.
For a network that is relatively attack-free:
1. Enable notify-only mode on the ports you want to monitor.
2. Set global sensitivity to low.
3. If SNMP trap receivers are available in your network, use the snmp-server
command to configure the switch to send SNMP traps.
4. Monitor the Event Log or (if configured) the available SNMP trap receivers
to identify hosts exhibiting high connection rates.
5. Check any hosts that exhibit relatively high connection rate behavior to
determine whether malicious code or legitimate use is the cause of the
behavior.
6. Hosts demonstrating high, but legitimate connection rates, such as heavily
used servers, may trigger a connection-rate filter. Configure connection
rate ACLs to create policy exceptions for trusted hosts. (Exceptions can
be configured for these criteria:
A single source host or group of source hosts
A source subnet
Either of the above with TCP or UDP criteria
(For more on connection rate ACLs, refer to “Application Options” on
page 3-6.)
7. Increase the sensitivity to Medium and repeat steps 5 and 6.
Note On networks that are relatively infection-free, sensitivity levels above
Medium are not recommended.)
8. (Optional.) Enable throttle or block mode on the monitored ports.
Page view 67
1 2 ... 63 64 65 66 67 68 69 70 71 72 73 ... 595 596

Comments to this Manuals

No comments