R2511-HP MSR Router Series Web-Based Configuration Guide(V5)

164
Figure 163 Add an intrusion detection policy
Attack protection configuration examples
Attack protection configuration example for MSR900/20-1X
Network requirements
As shown in Figure 164, internal users Host A, Host B, and Host C access the Internet through Router. The
network security requirements are as follows:
Router always drops packets from Host D, an attacker.
Router denies packets from Host C for 50 minutes for temporary access control of Host C.
Router provides scanning attack protection and automatically adds detected attackers to the
blacklist.
Router provides Land attack protection and Smurf attack protection.