Advanced Configuration and Management Guide
DISPLAYING SYSTEM-WIDEVLAN INFORMATION ...............................................................................
16-57
DISPLAYING VLAN INFORMATION FOR SPECIFIC PORTS ....................................................................
16-58
ROUTE HEALTH INJECTION........................................................................
17-1
CONFIGURATION EXAMPLE ........................................................................................................................
HTTP HEALTH CHECK ALGORITHM ...........................................................................................................
17-3
CONFIGURATION CONSIDERATIONS ............................................................................................................
17-4
CLI SYNTAX .............................................................................................................................................
GLOBAL CONFIG LEVEL ....................................................................................................................
REAL SERVER LEVEL .........................................................................................................................
INTERFACE LEVEL ..............................................................................................................................
17-5
CONFIGURING THE HTTP HEALTH CHECK ON THE ROUTING SWITCH .........................................................
CLI COMMANDS FOR 6308M-SX R1 .................................................................................................
CLI COMMANDS FOR 9308M R2 ........................................................................................................
17-6
CLI COMMANDS FOR 6308M-SX R3 ..................................................................................................
17-7
DISPLAYING SERVER AND APPLICATION PORT INFORMATION ......................................................................
DISPLAYING SERVER INFORMATION .....................................................................................................
DISPLAYING KEEPALIVE INFORMATION .................................................................................................
17-8
NETWORK MONITORING ..............................................................................
A-1
RMON SUPPORT ......................................................................................................................................
STATISTICS (RMON GROUP 1) ............................................................................................................
HISTORY (RMON GROUP 2) ...............................................................................................................
A-2
ALARM (RMON GROUP 3) ..................................................................................................................
EVENT (RMON GROUP 9) ...................................................................................................................
A-3
VIEWING SYSTEM INFORMATION .................................................................................................................
VIEWING CONFIGURATION INFORMATION .....................................................................................................
VIEWING PORT STATISTICS ........................................................................................................................
A-4
VIEWING STP STATISTICS ..........................................................................................................................
CLEARING STATISTICS ...............................................................................................................................
A-5
PROTECTING AGAINST DENIAL OF SERVICE ATTACKS..................................
B-1
PROTECTING AGAINST SMURF ATTACKS .....................................................................................................
AVOIDING BEING AN INTERMEDIARY IN A SMURF ATTACK ......................................................................
B-2
AVOIDING BEING A VICTIM IN A SMURF ATTACK ....................................................................................
PROTECTING AGAINST TCP SYN ATTACKS ................................................................................................
B-3
DISPLAYING STATISTICS ABOUT PACKETS DROPPED BECAUSE OF DOS ATTACKS ........................................
B-4
POLICIES AND FILTERS ...............................................................................
C-1
SCOPE ......................................................................................................................................................
C-2
DEFAULT FILTER ACTIONS .........................................................................................................................
C-3
POLICY AND FILTER PRECEDENCE ..............................................................................................................
C-4
QOS ...................................................................................................................................................
PRECEDENCE AMONG FILTERS ON DIFFERENT LAYERS ........................................................................
PRECEDENCE AMONG FILTERS ON THE SAME LAYER ...........................................................................
POLICIES ...................................................................................................................................................
C-5
xvi