Advanced Configuration and Management Guide

DISPLAYING SYSTEM-WIDEVLAN INFORMATION ...............................................................................

16-57

DISPLAYING VLAN INFORMATION FOR SPECIFIC PORTS ....................................................................

16-58

ROUTE HEALTH INJECTION........................................................................

17-1

CONFIGURATION EXAMPLE ........................................................................................................................

17-1

HTTP HEALTH CHECK ALGORITHM ...........................................................................................................

17-3

CONFIGURATION CONSIDERATIONS ............................................................................................................

17-4

CLI SYNTAX .............................................................................................................................................

17-4

GLOBAL CONFIG LEVEL ....................................................................................................................

17-4

REAL SERVER LEVEL .........................................................................................................................

17-4

INTERFACE LEVEL ..............................................................................................................................

17-5

CONFIGURING THE HTTP HEALTH CHECK ON THE ROUTING SWITCH .........................................................

17-5

CLI COMMANDS FOR 6308M-SX R1 .................................................................................................

17-5

CLI COMMANDS FOR 9308M R2 ........................................................................................................

17-6

CLI COMMANDS FOR 6308M-SX R3 ..................................................................................................

17-7

DISPLAYING SERVER AND APPLICATION PORT INFORMATION ......................................................................

17-7

DISPLAYING SERVER INFORMATION .....................................................................................................

17-7

DISPLAYING KEEPALIVE INFORMATION .................................................................................................

17-8

NETWORK MONITORING ..............................................................................

A-1

RMON SUPPORT ......................................................................................................................................

A-1

STATISTICS (RMON GROUP 1) ............................................................................................................

A-1

HISTORY (RMON GROUP 2) ...............................................................................................................

A-2

ALARM (RMON GROUP 3) ..................................................................................................................

A-2

EVENT (RMON GROUP 9) ...................................................................................................................

A-3

VIEWING SYSTEM INFORMATION .................................................................................................................

A-3

VIEWING CONFIGURATION INFORMATION .....................................................................................................

A-3

VIEWING PORT STATISTICS ........................................................................................................................

A-4

VIEWING STP STATISTICS ..........................................................................................................................

A-4

CLEARING STATISTICS ...............................................................................................................................

A-5

PROTECTING AGAINST DENIAL OF SERVICE ATTACKS..................................

B-1

PROTECTING AGAINST SMURF ATTACKS .....................................................................................................

B-1

AVOIDING BEING AN INTERMEDIARY IN A SMURF ATTACK ......................................................................

B-2

AVOIDING BEING A VICTIM IN A SMURF ATTACK ....................................................................................

B-2

PROTECTING AGAINST TCP SYN ATTACKS ................................................................................................

B-3

DISPLAYING STATISTICS ABOUT PACKETS DROPPED BECAUSE OF DOS ATTACKS ........................................

B-4

POLICIES AND FILTERS ...............................................................................

C-1

SCOPE ......................................................................................................................................................

C-2

DEFAULT FILTER ACTIONS .........................................................................................................................

C-3

POLICY AND FILTER PRECEDENCE ..............................................................................................................

C-4

QOS ...................................................................................................................................................

C-4

PRECEDENCE AMONG FILTERS ON DIFFERENT LAYERS ........................................................................

C-4

PRECEDENCE AMONG FILTERS ON THE SAME LAYER ...........................................................................

C-4

POLICIES ...................................................................................................................................................

C-5

xvi