R3204P16-HP Load Balancing Module Security Configuration Guide-6PW101

42
The icon indicates that the TCP proxy feature is enabled for the corresponding security zone. You
can click the Disable button beside the icon to disable the feature.
Return to TCP proxy configuration task list.
Adding a protected IP address entry
Select Security > Intrusion Detection from the navigation tree and then select the Protected IP
Configuration tab to enter the page that lists information about protected IP address entries and the
relative statistics, as shown in Figure 45. C
lick Add to enter the page for configuring a protected IP
address entry, as shown in Figure 46.
Figure 45 Protected IP address entries
Figure 46 Protected IP address entry configuration page
Table 18 describes the protected IP address entry configuration items.
Table 18 Protected IP address entry configuration items
Item Descri
p
tion
Protected IP Address
Type the IP address to be protected by the TCP proxy. It is the destination
IP address of the TCP connection.
Port Number
Type the destination port of the TCP connection.
The option any specifies that TCP proxy services TCP connection requests
to any port of the server at the destination IP address.
Return to TCP proxy configuration task list.
Displaying information about protected IP address entries
Select Security > Intrusion Detection from the navigation tree and then select the Protected IP
Configuration tab to enter the page that lists information about protected IP address entries, as shown
in Figure 45.
Table 19 de
scribes information about protected IP address entries.