D-Link DGS-3120-24TC Product Manual - Page 238

Loopback Detection Settings, Security > Loopback Detection Settings

Page 238 highlights

xStack® DGS-3120 Series Managed Switch Web UI Reference Guide Parameter Description BPDU Attack Protection State Click the radio buttons to enable or disable the BPDU Attack Protection state. Trap State Specify when a trap will be sent. Options to choose from are None, Attack Detected, Attack Cleared or Both. Log State Specify when a log entry will be sent. Options to choose from are None, Attack Detected, Attack Cleared or Both. Recover Time Specify the BPDU protection Auto-Recovery timer. The default value of the recovery timer is 60. Unit Select the unit you want to configure. From Port / To Port Select a range of ports to use for this configuration. State Use the drop-down menu to enable or disable the protection mode for a specific port. Mode Specify the BPDU protection mode. The default mode is shutdown. Drop - Drop all received BPDU packets when the port enters under attack state. Block - Drop all packets (include BPDU and normal packets) when the port enters under attack state. Shutdown - Shut down the port when the port enters under attack state. Click the Apply button to accept the changes made for each individual section. Loopback Detection Settings The Loopback Detection (LBD) function is used to detect the loop created by a specific port. This feature is used to temporarily shut down a port on the Switch when a CTP (Configuration Testing Protocol) packet has been looped back to the Switch. When the Switch detects CTP packets received from a port or a VLAN, this signifies a loop on the network. The Switch will automatically block the port or the VLAN and send an alert to the administrator. The Loopback Detection port will restart (change to normal state) when the Loopback Detection Recover Time times out. The Loopback Detection function can be implemented on a range of ports at a time. The user may enable or disable this function using the pull-down menu. To view this window, click Security > Loopback Detection Settings as shown below: 230

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339

xStack® DGS-3120 Series Managed Switch Web UI Reference Guide
230
Parameter
Description
BPDU Attack
Protection State
Click the radio buttons to enable or disable the BPDU Attack Protection state.
Trap State
Specify when a trap will be sent. Options to choose from are
None
,
Attack
Detected
,
Attack Cleared
or
Both
.
Log State
Specify when a log entry will be sent. Options to choose from are
None
,
Attack
Detected
,
Attack Cleared
or
Both
.
Recover Time
Specify the BPDU protection Auto-Recovery timer. The default value of the recovery
timer is 60.
Unit
Select the unit you want to configure.
From Port / To Port
Select a range of ports to use for this configuration.
State
Use the drop-down menu to enable or disable the protection mode for a specific
port.
Mode
Specify the BPDU protection mode. The default mode is shutdown.
Drop
– Drop all received BPDU packets when the port enters under attack state.
Block
– Drop all packets (include BPDU and normal packets) when the port enters
under attack state.
Shutdown
– Shut down the port when the port enters under attack state.
Click the
Apply
button to accept the changes made for each individual section.
Loopback Detection Settings
The Loopback Detection (LBD) function is used to detect the loop created by a specific port. This feature is used to
temporarily shut down a port on the Switch when a CTP (Configuration Testing Protocol) packet has been looped
back to the Switch. When the Switch detects CTP packets received from a port or a VLAN, this signifies a loop on
the network. The Switch will automatically block the port or the VLAN and send an alert to the administrator. The
Loopback Detection port will restart (change to normal state) when the Loopback Detection
Recover Time times
out. The Loopback Detection function can be implemented on a range of ports at a time. The user may enable or
disable this function using the pull-down menu.
To view this window, click
Security > Loopback Detection Settings
as shown below: