xv
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-112
Requirements for Using ACL Logging . . . . . . . . . . . . . . . . . . . . . . . . 10-112
ACL Logging Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-113
Enabling ACL Logging on the Switch . . . . . . . . . . . . . . . . . . . . . . . . 10-114
Configuring the Logging Timer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-116
Monitoring Static ACL Performance . . . . . . . . . . . . . . . . . . . . . . . . . 10-117
Example of ACL Performance Monitoring . . . . . . . . . . . . . . . . 10-119
Example of Resetting ACE Hit Counters to Zero . . . . . . . . . . . 10-121
IPv6 Counter Operation with Multiple Interface Assignments 10-122
IPv4 Counter Operation with Multiple Interface Assignments 10-123
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-128
11 Configuring Advanced Threat Protection
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-1
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-2
Enabling DHCP Snooping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-4
Enabling DHCP Snooping on VLANS . . . . . . . . . . . . . . . . . . . . . . . . . . 11-6
Configuring DHCP Snooping Trusted Ports . . . . . . . . . . . . . . . . . . . . 11-6
Configuring Authorized Server Addresses . . . . . . . . . . . . . . . . . . . . . . 11-7
Using DHCP Snooping with Option 82 . . . . . . . . . . . . . . . . . . . . . . . . . 11-8
Changing the Remote-id from a MAC to an IP Address . . . . . . 11-10
Disabling the MAC Address Check . . . . . . . . . . . . . . . . . . . . . . . 11-10
The DHCP Binding Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-11
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-15
Enabling Dynamic ARP Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-17
Configuring Trusted Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-17
Adding an IP-to-MAC Binding to the DHCP Database . . . . . . . . . . . 11-19
Configuring Additional Validation Checks on ARP Packets . . . . . . 11-20
Verifying the Configuration of Dynamic ARP Protection . . . . . . . . 11-20
Displaying ARP Packet Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-21
Содержание E3800 Series
Страница 1: ...HP Switch Software E3800 switches Software version KA 15 03 September 2011 Access Security Guide ...
Страница 2: ......
Страница 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Страница 30: ...xxviii ...
Страница 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Страница 186: ...4 72 Web and MAC Authentication Client Status ...
Страница 290: ...6 74 RADIUS Authentication Authorization and Accounting Dynamic Removal of Authentication Limits ...
Страница 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Страница 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Страница 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Страница 659: ...14 11 Configuring and Monitoring Port Security Port Security Figure 14 5 Examples of Show Mac Address Outputs ...
Страница 730: ...20 Index ...
Страница 731: ......