Virus Throttle works by intercepting IP connection requests, that is, connections in which the source subnet and destination address are different. The Virus Throttle tracks the number of recently made connections. If a new, intercepted request is to a destination to which a connection was recently made, the request is processed as normal. If the request is to a destination that has not had a recent connection, the request is processed only if the number of recent connections is below a
This capability can be applied to most common Layer 4 through 7 session and application protocols, including TCP connections, UDP packets, SMTP, IMAP, Web Proxy, HTTP, SSL, and DNS— virtually any protocol where the normal traffic does not look like a virus spreading. For Virus Throttle to work, IP routing and multiple VLANs with member ports must first be configured.
Note that some protocols, such as NetBIOS and WINS, and some applications such as network management scanners, notification services, and p2p file sharing are not appropriate for Virus Throttle. These protocols and applications initiate a broad burst of network traffic that could be misinterpreted by the Virus Throttle technology as a threat.
On the HP ProCurve Switch 5400zl, 3500yl, and 6200yl series, Virus Throttle is implemented through
52