EasyManuals Logo
Home>HPE>Network Router>FlexNetwork MSR Series

HPE FlexNetwork MSR Series User Manual

HPE FlexNetwork MSR Series
861 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #172 background imageLoading...
Page #172 background image
157
Figure 164 Add an intrusion detection policy
Attack protection configuration examples
Attack protection configuration example for MSR900/20-1X
Network requirements
As shown in Figure 165, internal users Host A, Host B, and Host C access the Internet through Router.
The network security requirements are as follows:
Router always drops packets from Host D, an attacker.
Router denies packets from Host C for 50 minutes for temporary access control of Host C.
Router provides scanning attack protection and automatically adds detected attackers to the
blacklist.
Router provides Land attack protection and Smurf attack protection.

Table of Contents

Other manuals for HPE FlexNetwork MSR Series

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the HPE FlexNetwork MSR Series and is the answer not in the manual?

HPE FlexNetwork MSR Series Specifications

General IconGeneral
BrandHPE
ModelFlexNetwork MSR Series
CategoryNetwork Router
LanguageEnglish

Related product manuals