HP 6125G HP 6125G & 6125G/XG Blade Switches Security Configuration Gui - Page 8

Configuring the IPv4 source guard function, vi

Page 8 highlights

SFTP server configuration example 209 Configuring SCP 212 Overview 212 Configuring the switch as an SCP server 212 Configuring the switch as the SCP client 213 SCP client configuration example 213 SCP server configuration example 214 Configuring SSL 216 Overview 216 SSL security mechanism 216 SSL protocol stack 216 Configuration task list 217 Configuring an SSL server policy 217 SSL server policy configuration example 219 Configuring an SSL client policy 220 Displaying and maintaining SSL 221 Troubleshooting SSL 221 Configuring TCP attack protection 223 Overview 223 Enabling the SYN Cookie feature 223 Displaying and maintaining TCP attack protection 223 Configuring IP source guard 225 Overview 225 Static IP source guard entries 225 Dynamic IP source guard entries 225 Configuration task list 226 Configuring the IPv4 source guard function 226 Configuring IPv4 source guard on a port 226 Configuring a static IPv4 source guard entry 227 Setting the maximum number of IPv4 source guard entries 228 Displaying and maintaining IP source guard 228 IP source guard configuration examples 228 Static IPv4 source guard configuration example 228 Dynamic IPv4 source guard using DHCP snooping configuration example 230 Dynamic IPv4 source guard using DHCP relay configuration example 232 Troubleshooting IP source guard 233 Configuring ARP attack protection 234 Overview 234 ARP attack protection configuration task list 234 Configuring ARP defense against IP packet attacks 235 Configuring ARP source suppression 235 Enabling ARP black hole routing 235 Displaying and maintaining ARP defense against IP packet attacks 236 Configuration example 236 Configuring ARP packet rate limit 237 Introduction 237 Configuration procedure 237 Configuring source MAC address based ARP attack detection 238 Configuration procedure 238 Displaying and maintaining source MAC address based ARP attack detection 238 Configuration example 239 Configuring ARP packet source MAC address consistency check 240 vi

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285

vi
SFTP server configuration example ···························································································································· 209
Configuring SCP······················································································································································ 212
Overview······································································································································································· 212
Configuring the switch as an SCP server ·················································································································· 212
Configuring the switch as the SCP client ··················································································································· 213
SCP client configuration example······················································································································ 213
SCP server configuration example ···················································································································· 214
Configuring SSL······················································································································································· 216
Overview······································································································································································· 216
SSL security mechanism ······································································································································ 216
SSL protocol stack ··············································································································································· 216
Configuration task list ·················································································································································· 217
Configuring an SSL server policy ······························································································································· 217
SSL server policy configuration example ·········································································································· 219
Configuring an SSL client policy ································································································································ 220
Displaying and maintaining SSL································································································································· 221
Troubleshooting SSL ····················································································································································· 221
Configuring TCP attack protection ························································································································· 223
Overview······································································································································································· 223
Enabling the SYN Cookie feature ······························································································································ 223
Displaying and maintaining TCP attack protection ·································································································· 223
Configuring IP source guard ·································································································································· 225
Overview······································································································································································· 225
Static IP source guard entries ····························································································································· 225
Dynamic IP source guard entries ······················································································································· 225
Configuration task list ·················································································································································· 226
Configuring the IPv4 source guard function
·············································································································· 226
Configuring IPv4 source guard on a port ········································································································· 226
Configuring a static IPv4 source guard entry ··································································································· 227
Setting the maximum number of IPv4 source guard entries ············································································ 228
Displaying and maintaining IP source guard ············································································································ 228
IP source guard configuration examples ··················································································································· 228
Static IPv4 source guard configuration example ····························································································· 228
Dynamic IPv4 source guard using DHCP snooping configuration example ················································· 230
Dynamic IPv4 source guard using DHCP relay configuration example ························································ 232
Troubleshooting IP source guard ································································································································ 233
Configuring ARP attack protection························································································································· 234
Overview······································································································································································· 234
ARP attack protection configuration task list ············································································································· 234
Configuring ARP defense against IP packet attacks ································································································· 235
Configuring ARP source suppression ················································································································ 235
Enabling ARP black hole routing ······················································································································· 235
Displaying and maintaining ARP defense against IP packet attacks ····························································· 236
Configuration example ······································································································································· 236
Configuring ARP packet rate limit ······························································································································ 237
Introduction ·························································································································································· 237
Configuration procedure ···································································································································· 237
Configuring source MAC address based ARP attack detection ············································································· 238
Configuration procedure ···································································································································· 238
Displaying and maintaining source MAC address based ARP attack detection·········································· 238
Configuration example ······································································································································· 239
Configuring ARP packet source MAC address consistency check ········································································· 240