11.2.7 Principle of Security Data Plan
The security plan involves system security plan, user security plan, and service security plan.
Security policy ensures service security from different aspects.
NOTE
l
The device provides complete security measures, but not all security measures need to be deployed. Only
the security measures that meet the following requirements need to be deployed:
l
The security measures can be used on the live network.
l
The security measures are easy to deploy.
l
The security measures are effective.
l
Different ONUs support different security features. Select the security feature recommended in this topic
according to actual ONU capabilities.
System Security
Security
Vulnerability
Solution
Description and Usage
Suggestion
DoS attack
Enable the anti-DoS-attack
function for OLT and
MDU.
After the anti-DoS-attack function is
enabled, control packets are
monitored and those exceeding the
number threshold are discarded.
Use this solution for new site
deployment.
IP attack
Enable the anti-IP-attack
function for OLT and
MDU.
After the anti-IP-attack function is
enabled, a device discards the IP
packets received from the user side
whose destination IP address is the IP
address of the device, and therefore
the system is protected.
Use this solution for new site
deployment.
SmartAX MA5600T/MA5603T/MA5608T Multi-service
Access Module
Commissioning and Configuration Guide
11 FTTB and FTTC Solution Configuration
Issue 01 (2014-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
854