ProCurve 6200yl User's Guide Page 403

  • Download
  • Add to my manuals
  • Print
  • Page
    / 596
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 402
11-3
Configuring Advanced Threat Protection
DHCP Snooping
Attempts to exhaust system resources so that sufficient resources are
not available to transmit legitimate traffic, indicated by an unusually
high use of specific system resources
Attempts to attack the switch’s CPU and introduce delay in system
response time to new network events
Attempts by hackers to access the switch, indicated by an excessive
number of failed logins or port authentication failures
Attempts to deny switch service by filling the forwarding table, indi-
cated by an increased number of learned MAC addresses or a high
number of MAC address moves from one port to another
Attempts to exhaust available CPU resources, indicated by an
increased number of learned MAC address events being discarded
DHCP Snooping
Overview
You can use DHCP snooping to help avoid the Denial of Service attacks that
result from unauthorized users adding a DHCP server to the network that then
provides invalid configuration data to other DHCP clients on the network.
Command Page
dhcp-snooping page 11-4
authorized-server page 11-8
database page 11-11
option page 11-8
trust page 11-7
verify page 11-10
vlan page 11-6
show dhcp-snooping page 11-5
show dhcp-snooping stats page 11-5
dhcp-snooping binding page 11-12
debug dhcp-snooping page 11-12
Page view 402
1 2 ... 398 399 400 401 402 403 404 405 406 407 408 ... 595 596

Comments to this Manuals

No comments