R3204P16-HP Load Balancing Module Security Configuration Guide-6PW101
29
Figure 30 Connection limit configuration page
Table 13 describes the connection limit configuration items.
Table 13 Connection limit configuration items
Item Descri
p
tion
Security Zone
Select a security zone to perform connection limit configuration
for it.
Discard packets when the specified attack
is detected
Select this option to discard subsequent packets destined for or
sourced from an IP address when the number of the connections
for that IP address has exceeded the limit.
Enable connection limit per source IP
Select the option to set the maximum number of connections that
can be present for a source IP address.
Threshold
Enable connection limit per dest IP
Select the option to set the maximum number of connections that
can be present for a destination IP address.
Threshold
Configuring scanning detection
NOTE:
• Scanning detection is intended to detect scanning behaviors and is usually configured for an external
zone.
• Scanning detection can be configured to add blacklist entries automatically. If you remove such a
blacklist entry, the system will not add the entry back to the blacklist during a period of time. This is
because the system considers that the subsequent packets are from the same attack.
Select Security > Intrusion Detection from the navigation tree and then select the Scanning Detection tab
to enter the scanning detection configuration page, as shown in Figure 31. Y
ou can select a security zone
and then view and configure the scanning detection rule for the security zone.
Figure 31 Scanning detection configuration page
Table 14 lists the scanning detection configuration items.