Cisco Ethernet switch Manuale Utente Pagina 19

  • Scaricare
  • Aggiungi ai miei manuali
  • Stampa
  • Pagina
    / 84
  • Indice
  • SEGNALIBRI
  • Valutato. / 5. Basato su recensioni clienti
Vedere la pagina 18
191919
© 2002, Cisco Systems, Inc. All rights reserved.
l2-security-bh.ppt
MAC Flooding Attack Mitigation
¥ Port Security
Capabilities are dependant on the platform
Allows you to specify MAC addresses for each port, or
to learn a certain number of MAC addresses per port
Upon detection of an invalid MAC the switch can be
configured to block only the offending MAC or just shut
down the port
Port security prevents macof from flooding the CAM
table
http://cisco.com/univercd/cc/td/doc/product/lan/cat5000/rel_5_4/config/sec_port.htm
Vedere la pagina 18
1 2 ... 14 15 16 17 18 19 20 21 22 23 24 ... 83 84

Commenti su questo manuale

Nessun commento