Configuration Guide
NFPP Configuration
1 Gi0/1 1.1.1.1 110
2 Gi0/2 1.1.2.1 61
Total
:
2 hosts
Ruijie#
show nfpp icmp-guard hosts vlan
1
interface
G
0/1 1.1.1.1
If column 1 shows '*', it means "hardware do not isolate user".
VLAN interface IP address remain-time(s)
---- -------- --------- -------------
1 Gi0/1 1.1.1.1 80
Total
:
1 host
Showing the trusted host configuration
Command
Function
Ruijie#
show
nfpp
icmp-guard
trusted-host
Show the trusted hosts.
For example,
Ruijie#
show nfpp icmp-guard trusted-host
IP address mask
--------- ------
1.1.1.0 255.255.255.0
1.1.2.0 255.255.255.0
Total
:
2 record(s)
DHCP-guard
DHCP-guard Overview
The DHCP protocol is widely used to dynamically allocate the IP address in the
LAN, and plays an important role in the network security. The
“DHCP
exhaustion
” attack occurs in the way of broadcasting the DHCP request packets
through faking the MAC address. If there are too many DHCP request packets,
the attacker may use up the addresses provided in the DHCP server. To this
end, a legal host fails to request for a DHCP IP address and access to the
network. The workaround for the
“DHCP exhaustion” attack: one one hand, you
may configure the DHCP packet rate-limit; on the other hand, you may detect
and isolate the attack source.
The DHCP attack detection could be host-based or port-based. Host-based
ARP
attack
detection
adopts
the
combination
of
source
IP
address/VID/port-based. For each attack detection, you can configure the
rate-limit threshold and warning threshold. The DHCP packet will be dropped
when the packet rate exceeds the rate-limit threshold. When the DHCP packet
Summary of Contents for RG-S2900G-E Series
Page 1: ...RG S2900G E Series Switch RGOS Configuration Guide Release 10 4 2b12 p1 ...
Page 91: ...Configuration Guide Configuring PoE Configuration ...
Page 133: ...Configuration Guide EEE Configuration ...
Page 319: ...Configuration Guide QinQ Configuration ...
Page 408: ......
Page 409: ...IP Routing Configuration 1 Static Route Configuration ...
Page 412: ......
Page 413: ...Multicast Configuration 1 IGMP Snooping Configuration 2 MLD Snooping Configuration ...
Page 757: ......
Page 758: ...ACL QoS Configuration 1 Access Control List Configuration 2 QoS Configuration ...
Page 801: ...Reliability Configuration 1 RLDP Configuration 2 TPP Configuration 3 SEM Configuration ...
Page 901: ...Configuration Guide ERSPAN Configuration ...
Page 902: ...Web based Configuration 1 Web based Configuration ...