HP 6125G HP Networking guide to hardening Comware-based devices - Page 1

HP 6125G Manual

Page 1 highlights

Technical white paper HP Networking guide to hardening Comware-based devices Table of contents Introduction 2 Management plane 2 General management plane hardening 2 Limiting access to the network with infrastructure ACLs 5 Securing interactive management sessions 7 Fortifying Simple Network Management Protocol 11 Logging best practices 13 HP Comware software configuration management 15 Control plane 16 General control plane hardening 16 Limiting the CPU impact of control plane traffic 18 Securing BGP 20 Securing Interior Gateway Protocols 22 Securing Virtual Router Redundancy Protocol 24 Data plane 24 General data plane hardening 24 Filtering transit traffic with Transit ACLs 25 Anti-spoofing protections 26 Limiting the CPU impact of data plane traffic 30 Traffic identification and traceback 30 Access control with VLAN QoS policy and port access control lists 34 Using private VLANs 35 Port isolation 37

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40

Technical white paper
HP Networking guide to hardening
Comware-based devices
Table of contents
Introduction
2
Management plane
2
General management plane hardening
2
Limiting access to the network with
infrastructure ACLs
5
Securing interactive management
sessions
7
Fortifying Simple Network
Management Protocol
11
Logging best practices
13
HP Comware software configuration
management
15
Control plane
16
General control plane hardening
16
Limiting the CPU impact of control
plane traffic
18
Securing BGP
20
Securing Interior Gateway Protocols
22
Securing Virtual Router Redundancy
Protocol
24
Data plane
24
General data plane hardening
24
Filtering transit traffic with Transit
ACLs
25
Anti-spoofing protections
26
Limiting the CPU impact of data plane
traffic
30
Traffic identification and traceback
30
Access control with VLAN QoS policy
and port access control lists
34
Using private VLANs
35
Port isolation
37