beautypg.com

H3C Technologies H3C SecPath F1000-E User Manual

Page 117

background image

i

Table of Contents

Connection Limit Configuration··································································································································· 1

Connection Limit Overview ··············································································································································1

Connection Limit Configuration Task List ························································································································1

Creating a Connection Limit Policy ·································································································································1

Configuring the Connection Limit Policy·························································································································2

Configuring an IP Address-Based Connection Limit Rule ·····················································································2

Applying the Connection Limit Policy······························································································································2

Displaying and Maintaining Connection Limiting ·········································································································3

Connection Limit Configuration Example ·······················································································································3

Connection Limit Configuration Example···············································································································3

Troubleshooting Connection Limiting ······························································································································4

Connection Limit Rules with Overlapping Segments ····························································································4

Connection Limit Rules with Overlapping Protocol Types ····················································································5