H3C Technologies H3C SecBlade IPS Cards User Manual
Page 12
v
DDoS Protection States.................................................................................................................17-3
Configuring DDoS Protection................................................................................................................17-3
Creating a DDoS Policy.................................................................................................................17-5
Configuring Learning Rules ...........................................................................................................17-6
Configuring Detection Rules........................................................................................................17-11
Configuring Static Filtering Rules ................................................................................................17-15
Displaying DDoS Data Statistics .................................................................................................17-19
DDoS Protection Configuration Example............................................................................................17-20
Configuration Guidelines.....................................................................................................................17-22
18 Bandwidth Management .......................................................................................................................18-1
Overview ...............................................................................................................................................18-1
Introduction to Services .................................................................................................................18-1
Configuring Bandwidth Management....................................................................................................18-1
Configuration Task List..................................................................................................................18-1
Configuring Protocols ....................................................................................................................18-2
Configuring Services .....................................................................................................................18-4
Configuration Guidelines.....................................................................................................................18-17
19 Blacklist ..................................................................................................................................................19-1
Blacklist Overview .................................................................................................................................19-1
Configuring Blacklist..............................................................................................................................19-1
Configuration Task List..................................................................................................................19-1
Adding a Blacklist Entry Manually .................................................................................................19-1
Querying Blacklist Entries..............................................................................................................19-2
Blacklist Configuration Example ...........................................................................................................19-3
20 Packet Statistics ....................................................................................................................................20-1
Overview ...............................................................................................................................................20-1
Viewing Packet Statistics ......................................................................................................................20-1
21 Traffic Statistics Report ........................................................................................................................21-1
Overview ...............................................................................................................................................21-1
Configuring Traffic Statistics Reports....................................................................................................21-1
Configuration Task List..................................................................................................................21-1
Configuring Traffic Statistics Reports ............................................................................................21-2
Querying the Traffic Statistics Reports..........................................................................................21-3
Configuring Top N Reports............................................................................................................21-4
Querying Top N Reports................................................................................................................21-4
22 Attack Report .........................................................................................................................................22-1
Overview ...............................................................................................................................................22-1