11-2
Configuring Advanced Threat Protection
DHCP Snooping
•
Attempts to fill all IP address entries in the switch’s forwarding table
and cause legitimate traffic to be dropped, indicated by an increased
number of learned IP destination addresses
•
Attempts to spread viruses, indicated by an increased number of ARP
request packets
•
Attempts to exhaust system resources so that sufficient resources are
not available to transmit legitimate traffic, indicated by an unusually
high use of specific system resources
•
Attempts to attack the switch’s CPU and introduce delay in system
response time to new network events
•
Attempts by hackers to access the switch, indicated by an excessive
number of failed logins or port authentication failures
•
Attempts to deny switch service by filling the forwarding table, indi-
cated by an increased number of learned MAC addresses or a high
number of MAC address moves from one port to another
•
Attempts to exhaust available CPU resources, indicated by an
increased number of learned MAC address events being discarded
DHCP Snooping
Command
Page
dhcp-snooping
authorized-server
database
option
trust
verify
vlan
show dhcp-snooping
show dhcp-snooping stats
dhcp-snooping binding
debug dhcp-snooping
Содержание E3800 Series
Страница 1: ...HP Switch Software E3800 switches Software version KA 15 03 September 2011 Access Security Guide ...
Страница 2: ......
Страница 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Страница 30: ...xxviii ...
Страница 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Страница 186: ...4 72 Web and MAC Authentication Client Status ...
Страница 290: ...6 74 RADIUS Authentication Authorization and Accounting Dynamic Removal of Authentication Limits ...
Страница 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Страница 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Страница 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Страница 659: ...14 11 Configuring and Monitoring Port Security Port Security Figure 14 5 Examples of Show Mac Address Outputs ...
Страница 730: ...20 Index ...
Страница 731: ......