Contents
6
Voice Applications ....................................................................................................................................169
Video Applications ....................................................................................................................................171
Critical Database ......................................................................................................................................173
Policy Component Hierarchy ....................................................................................................................174
Chapter 15: Denial of Service Defenses
....................................................................................................177
Supported Platforms .......................................................................................................................................178
Overview .........................................................................................................................................................179
SYN Flood Attack............................................................................................................................................180
Smurf Attack ...................................................................................................................................................181
Land Attack .....................................................................................................................................................182
Teardrop Attack ..............................................................................................................................................184
Ping of Death Attack .......................................................................................................................................185
IP Options Attack ............................................................................................................................................186
Mirroring Traffic...............................................................................................................................................187
Denial of Service Defense Guidelines ............................................................................................................188
Chapter 16: Power Over Ethernet
...............................................................................................................189
Supported Platforms .......................................................................................................................................190
Overview .........................................................................................................................................................191
Power Budgeting.............................................................................................................................................192
Port Prioritization.............................................................................................................................................193
PoE Device Classes .......................................................................................................................................194
Section III: Snooping Protocols ..............................................................................195
Chapter 17: Internet Group Management Protocol Snooping
.................................................................197
Supported Platforms .......................................................................................................................................198
Overview .........................................................................................................................................................199
Chapter 18: Multicast Listener Discovery Snooping
................................................................................201
Supported Platforms .......................................................................................................................................202
Overview .........................................................................................................................................................203
Chapter 19: Router Redundancy Protocol Snooping
...............................................................................205
Supported Platforms .......................................................................................................................................206
Overview .........................................................................................................................................................207
Guidelines .......................................................................................................................................................208
Chapter 20: Ethernet Protection Switching Ring Snooping
....................................................................209
Supported Platforms .......................................................................................................................................210
Overview .........................................................................................................................................................211
Restrictions .....................................................................................................................................................213
Guidelines .......................................................................................................................................................215
Section IV: SNMPv3 ................................................................................................217
Chapter 21: SNMPv3
....................................................................................................................................219
Supported Platforms .......................................................................................................................................220
Overview .........................................................................................................................................................221
SNMPv3 Authentication Protocols ..................................................................................................................222
SNMPv3 Privacy Protocol...............................................................................................................................223
SNMPv3 MIB Views........................................................................................................................................224
SNMPv3 Storage Types .................................................................................................................................226
SNMPv3 Message Notification .......................................................................................................................227
SNMPv3 Tables ..............................................................................................................................................228
Содержание AT-S63
Страница 14: ...Figures 14 ...
Страница 18: ...Tables 18 ...
Страница 28: ...28 Section I Basic Operations ...
Страница 58: ...Chapter 1 Overview 58 ...
Страница 76: ...Chapter 2 AT 9400Ts Stacks 76 Section I Basic Operations ...
Страница 96: ...Chapter 5 MAC Address Table 96 Section I Basic Operations ...
Страница 114: ...Chapter 8 Port Mirror 114 Section I Basic Operations ...
Страница 116: ...116 Section II Advanced Operations ...
Страница 146: ...Chapter 12 Access Control Lists 146 Section II Advanced Operations ...
Страница 176: ...Chapter 14 Quality of Service 176 Section II Advanced Operations ...
Страница 196: ...196 Section III Snooping Protocols ...
Страница 204: ...Chapter 18 Multicast Listener Discovery Snooping 204 Section III Snooping Protocols ...
Страница 216: ...Chapter 20 Ethernet Protection Switching Ring Snooping 216 Section III Snooping Protocols ...
Страница 218: ...218 Section IV SNMPv3 ...
Страница 234: ...234 Section V Spanning Tree Protocols ...
Страница 268: ...268 Section VI Virtual LANs ...
Страница 306: ...Chapter 27 Protected Ports VLANs 306 Section VI Virtual LANs ...
Страница 320: ...320 Section VII Internet Protocol Routing ...
Страница 360: ...Chapter 30 BOOTP Relay Agent 360 Section VII Routing ...
Страница 370: ...Chapter 31 Virtual Router Redundancy Protocol 370 Section VII Routing ...
Страница 372: ...372 Section VIII Port Security ...
Страница 402: ...Chapter 33 802 1x Port based Network Access Control 402 Section VIII Port Security ...
Страница 404: ...404 Section IX Management Security ...
Страница 436: ...Chapter 36 PKI Certificates and SSL 436 Section IX Management Security ...
Страница 454: ...Chapter 38 TACACS and RADIUS Protocols 454 Section IX Management Security ...
Страница 462: ...Chapter 39 Management Access Control List 462 Section IX Management Security ...
Страница 504: ...Appendix B SNMPv3 Configuration Examples 504 Security Model Security Level Storage Type SNMPv3 Parameters Continued ...
Страница 532: ...Appendix D MIB Objects 532 ...