Applying the connection limit policy, Displaying and maintaining connection limiting, Troubleshooting connection limiting – H3C Technologies H3C SecBlade LB Cards User Manual
Page 263: Symptom, Analysis, Solution, Enabling traffic statistics for a security zone
252
Applying the connection limit policy
To make a connection limit policy take effect, apply it globally or to a service module.
To apply a connection limit policy:
Step Command
Remarks
1.
Enter system view.
system-view
N/A
2.
Apply a connection limit
policy.
connection-limit apply policy
policy-number
Only one connection limit policy
can be applied globally.
Displaying and maintaining connection limiting
Task Command
Remarks
Display information about
one or all connection limit
policies.
display connection-limit policy { policy-number |
all } [ | { begin | exclude | include }
regular-expression ]
Available in any view.
Troubleshooting connection limiting
Symptom
On LB, create a connection limit policy and configure two rules for the policy. One limits connections
from each host on segment 192.168.0.0/24 with the upper connection limit 10, and another limits
connections from 192.168.0.100 with the upper connection limit 100.
[LB] connection-limit policy 0
[LB-connection-limit-policy-0] limit 0 source ip 192.168.0.0 24 destination ip any
protocol ip max-connections 10 per-source
[LB-connection-limit-policy-0] limit 1 source ip 192.168.0.100 32 destination ip any
protocol ip max-connections 100 per-source
With the configuration, the host at 192.168.0.100 can only initiate up to 10 connections to the external
network.
Analysis
Both rules limit 0 and limit 1 contain the IP address 192.168.0.100, and the rule with a smaller ID is
matched first. The rule limit 0 is used for limiting connections from 192.168.0.100.
Solution
Rearrange the two connection limit rules by exchanging their rule IDs so that the rule for the host is
matched first.
Enabling traffic statistics for a security zone
To collect traffic statistics on a security zone, you need to enable the traffic statistics function on the
security zone. The device supports traffic statistics in the following modes:
•
By direction, inbound, or outbound of a security zone—Collect statistics on packets that enter or
leave a security zone on the device.