beautypg.com

H3C Technologies H3C SecBlade IPS Cards User Manual

Page 12

background image

v

DDoS Protection States.................................................................................................................17-3

Configuring DDoS Protection................................................................................................................17-3

DDoS Protection Configuration Task List......................................................................................17-3

Creating a DDoS Policy.................................................................................................................17-5

Configuring Learning Rules ...........................................................................................................17-6

Applying a DDoS Policy on a Segment .........................................................................................17-8

Maintaining a DDoS Policy Application .......................................................................................17-10

Configuring Detection Rules........................................................................................................17-11

Configuring Static Filtering Rules ................................................................................................17-15

Configuring Dynamic Filtering Rules ...........................................................................................17-18

Displaying DDoS Data Statistics .................................................................................................17-19

DDoS Protection Configuration Example............................................................................................17-20

Configuration Guidelines.....................................................................................................................17-22

18 Bandwidth Management .......................................................................................................................18-1

Overview ...............................................................................................................................................18-1

Introduction to Bandwidth Management........................................................................................18-1

Introduction to Services .................................................................................................................18-1

Configuring Bandwidth Management....................................................................................................18-1

Configuration Task List..................................................................................................................18-1

Configuring Protocols ....................................................................................................................18-2

Configuring Services .....................................................................................................................18-4

Creating and Applying a Bandwidth Management Policy .............................................................18-6

Bandwidth Management Configuration Example................................................................................18-11

Configuration Guidelines.....................................................................................................................18-17

19 Blacklist ..................................................................................................................................................19-1

Blacklist Overview .................................................................................................................................19-1

Configuring Blacklist..............................................................................................................................19-1

Configuration Task List..................................................................................................................19-1

Adding a Blacklist Entry Manually .................................................................................................19-1

Querying Blacklist Entries..............................................................................................................19-2

Blacklist Configuration Example ...........................................................................................................19-3

20 Packet Statistics ....................................................................................................................................20-1

Overview ...............................................................................................................................................20-1

Viewing Packet Statistics ......................................................................................................................20-1

21 Traffic Statistics Report ........................................................................................................................21-1

Overview ...............................................................................................................................................21-1

Configuring Traffic Statistics Reports....................................................................................................21-1

Configuration Task List..................................................................................................................21-1

Configuring Traffic Statistics Reports ............................................................................................21-2

Querying the Traffic Statistics Reports..........................................................................................21-3

Configuring Top N Reports............................................................................................................21-4

Querying Top N Reports................................................................................................................21-4

22 Attack Report .........................................................................................................................................22-1

Overview ...............................................................................................................................................22-1