R3166-R3206-HP High-End Firewalls Attack Protection Configuration Guide-6PW101
15
Figure 12 Connection limit configuration page
Table 9 Connection limit configuration items
Item Descri
p
tion
Security Zone
Select a security zone to which the connection limit
configuration will apply.
Discard packets when the specified attack is detected
Select this option to block connections destined for or
sourced from an IP address when the number of the
connections for that IP address has exceeded the limit.
Enable connection limit per source IP
Select the option to set the maximum number of
connections that can be present for a source IP
address.
Threshold
Enable connection limit per dest IP
Select the option to set the maximum number of
connections that can be present for a destination IP
address.
Threshold
Configuring scanning detection
From the navigation tree, select Intrusion Detection > Traffic Abnormality > Scanning Detection to enter
the scanning detection configuration page, as shown in Figure 13. You
can select a security zone and
then view and configure the scanning detection rule for the security zone.
Figure 13 Scanning detection configuration page
Table 10 Scanning detection configuration items
Item Descri
p
tion
Security Zone
Select a security zone to which the scanning detection configuration will apply.