Chapter 14
Access Security
Configuration
Access security configuration can assure the safety of subscriber accounts, prevent illegal
users from accessing the device, and illegal user-side packets from attacking the device.
The ZXA10 C300 supports the following access security features:
l
Port identification
l
MAC address anti-spoofing
l
anti-spoofing
l
IP source guard
l
Split horizon
l
l
ARP proxy
Table of Contents
14.1 Port Identification Configuration
The system provides the port identification mechanism to improve network security and
prevent user accounts from being stolen.
The system implements port identification
through the following techniques:
l
v4 Layer-2 Relay Agent
l
Intermediate Agent
l
DHCPv6 Layer-2 Relay Agent
l
LIO
14.1.1 Configuring the Port Identification
Port-identification is to define the format and content of the Circuit ID (CID) and Remote
ID (RID).
14-1
SJ-20130520164529-007|2013-06-30 (R1.0)
ZTE Proprietary and Confidential