HP (Hewlett-Packard) 6208M-SX Switch User Manual


 
Advanced Configuration and Management Guide
DISPLAYING SYSTEM-WIDE VLAN INFORMATION ...............................................................................16-57
D
ISPLAYING VLAN INFORMATION FOR SPECIFIC PORTS ....................................................................16-58
ROUTE HEALTH INJECTION........................................................................ 17-1
CONFIGURATION EXAMPLE ........................................................................................................................17-1
HTTP HEALTH CHECK ALGORITHM ...........................................................................................................17-3
C
ONFIGURATION CONSIDERATIONS ............................................................................................................17-4
CLI S
YNTAX .............................................................................................................................................17-4
GLOBAL CONFIG LEVEL ....................................................................................................................17-4
R
EAL SERVER LEVEL .........................................................................................................................17-4
I
NTERFACE LEVEL ..............................................................................................................................17-5
CONFIGURING THE HTTP HEALTH CHECK ON THE ROUTING SWITCH .........................................................17-5
CLI C
OMMANDS FOR 6308M-SX R1 .................................................................................................17-5
CLI C
OMMANDS FOR 9308M R2 ........................................................................................................17-6
CLI COMMANDS FOR 6308M-SX R3 ..................................................................................................17-7
D
ISPLAYING SERVER AND APPLICATION PORT INFORMATION ......................................................................17-7
D
ISPLAYING SERVER INFORMATION .....................................................................................................17-7
D
ISPLAYING KEEPALIVE INFORMATION .................................................................................................17-8
NETWORK MONITORING ..............................................................................A-1
RMON SUPPORT ...................................................................................................................................... A-1
S
TATISTICS (RMON GROUP 1) ............................................................................................................ A-1
H
ISTORY (RMON GROUP 2) ............................................................................................................... A-2
A
LARM (RMON GROUP 3) .................................................................................................................. A-2
E
VENT (RMON GROUP 9) ................................................................................................................... A-3
V
IEWING SYSTEM INFORMATION ................................................................................................................. A-3
V
IEWING CONFIGURATION INFORMATION ..................................................................................................... A-3
V
IEWING PORT STATISTICS ........................................................................................................................ A-4
V
IEWING STP STATISTICS .......................................................................................................................... A-4
C
LEARING STATISTICS ...............................................................................................................................A-5
PROTECTING AGAINST DENIAL OF SERVICE ATTACKS..................................B-1
PROTECTING AGAINST SMURF ATTACKS ..................................................................................................... B-1
A
VOIDING BEING AN INTERMEDIARY IN A SMURF ATTACK ...................................................................... B-2
A
VOIDING BEING A VICTIM IN A SMURF ATTACK .................................................................................... B-2
P
ROTECTING AGAINST TCP SYN ATTACKS ................................................................................................ B-3
D
ISPLAYING STATISTICS ABOUT PACKETS DROPPED BECAUSE OF DOS ATTACKS ........................................ B-4
POLICIES AND FILTERS ...............................................................................C-1
SCOPE ...................................................................................................................................................... C-2
D
EFAULT FILTER ACTIONS ......................................................................................................................... C-3
P
OLICY AND FILTER PRECEDENCE .............................................................................................................. C-4
Q
OS ................................................................................................................................................... C-4
P
RECEDENCE AMONG FILTERS ON DIFFERENT LAYERS ........................................................................ C-4
P
RECEDENCE AMONG FILTERS ON THE SAME LAYER ........................................................................... C-4
P
OLICIES ................................................................................................................................................... C-5
xvi