Chapter 8
| General Security Measures
Port-based Traffic Segmentation
– 265 –
Command Mode
Global Configuration
Note:
This switch cannot trap packets where both the source port and destination
port are set to zero.
Example
Console(config)#flow tcp-udp-port-zero forward
Console(config)#
show flow
This command shows the action taken against attacks which set the Layer 4 source
or destination port to zero.
Command Mode
Privileged Exec
Example
Console#show flow
TCP/UDP port-zero action : drop
Console#
Port-based Traffic Segmentation
If tighter security is required for passing traffic from different clients through downlink ports
on the local network and over uplink ports to the service provider, port-based traffic
segmentation can be used to isolate traffic for individual clients.
Table 54: Commands for Configuring Traffic Segmentation
Command
Function
Mode
traffic-segmentation
Enables and configures traffic segmentation
GC
show traffic-segmentation
Displays the configured traffic segments
PE
Summary of Contents for EX-3524
Page 2: ......
Page 28: ...Figures 28 ...
Page 34: ...Section I Getting Started 34 ...
Page 58: ...Chapter 1 Initial Switch Configuration Setting the System Clock 58 ...
Page 72: ...Chapter 2 Using the Command Line Interface CLI Command Groups 72 ...
Page 156: ...Chapter 5 SNMP Commands Notification Log Commands 156 ...
Page 164: ...Chapter 6 Remote Monitoring Commands 164 ...
Page 218: ...Chapter 7 Authentication Commands Management IP Filter 218 ...
Page 268: ...Chapter 8 General Security Measures Port based Traffic Segmentation 268 ...
Page 292: ...Chapter 9 Access Control Lists ACL Information 292 ...
Page 312: ...Chapter 10 Interface Commands Power Savings 312 ...
Page 324: ...Chapter 11 Link Aggregation Commands Trunk Status Display Commands 324 ...
Page 366: ...Chapter 15 Address Table Commands 366 ...
Page 428: ...Chapter 17 VLAN Commands Configuring Voice VLANs 428 ...
Page 572: ...Chapter 25 IP Interface Commands IPv6 Interface 572 ...
Page 578: ...Section I Appendices 578 ...