EasyManua.ls Logo

HP MSR SERIES - Attack Protection Configuration Examples; Attack Protection Configuration Example for MSR90020-1 X

HP MSR SERIES
889 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
164
Figure 163 Add an intrusion detection policy
Attack protection configuration examples
Attack protection configuration example for MSR900/20-1X
Network requirements
As shown in Figure 164, internal users Host A, Host B, and Host C access the Internet through Router. The
network security requirements are as follows:
Router always drops packets from Host D, an attacker.
Router denies packets from Host C for 50 minutes for temporary access control of Host C.
Router provides scanning attack protection and automatically adds detected attackers to the
blacklist.
Router provides Land attack protection and Smurf attack protection.

Table of Contents

Other manuals for HP MSR SERIES

Related product manuals