D-Link DGS-1510-28P User Manual - Page 328

Security > BPDU Attack Protection, BPDU Attack Protection State, State, From Port / To Port, Block

Page 328 highlights

DGS-1510 Series Gigabit Ethernet SmartPro Switch Web UI Reference Guide The under attack state have three modes: drop, block, and shutdown. A BPDU protection enabled port will enter an under attack state when it receives one STP BPDU packet and it will take action based on the configuration. Thus, BPDU protection can only be enabled on the STP-disabled port. BPDU protection has a higher priority than the FBPDU setting configured by configure STP command in the determination of BPDU handling. That is, when FBPDU is configured to forward STP BPDU but BPDU protection is enabled, then the port will not forward STP BPDU. BPDU protection also has a higher priority than the BPDU tunnel port setting in determination of BPDU handling. That is, when a port is configured as BPDU tunnel port for STP, it will forward STP BPDU. But if the port is BPDU protection enabled. Then the port will not forward STP BPDU. To view the following window, click Security > BPDU Attack Protection, as shown below: Figure 9-62 BPDU Attack Protection window The fields that can be configured are described below: Parameter BPDU Attack Protection State BPDU Attack Protection Trap State Unit From Port / To Port State Mode Description Select to enable or disable the BPDU attack protection feature's global state here. Select to enable or disable the BPDU attack protection feature's trap state here. Select the switch unit that will be used for this configuration here. Select the appropriate port range used for the configuration here. Select to enable or disable the BPDU attack protection feature's state on the port(s) specified. Select the BPDU attack protection feature's mode that will be applied to the port(s) specified. Options to choose from are Drop, Block and Shutdown. Drop - Drop all received BPDU packets when the port enters under attack state. Block - Drop all packets (include BPDU and normal packets) when the port enters under attack state. 320

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430

DGS-1510 Series Gigabit Ethernet SmartPro Switch Web UI Reference Guide
320
The under attack state have three modes: drop, block, and shutdown. A BPDU protection enabled port
will enter an under attack state when it receives one STP BPDU packet and it will take action based on
the configuration. Thus, BPDU protection can only be enabled on the STP-disabled port.
BPDU protection has a higher priority than the FBPDU setting configured by configure STP command in
the determination of BPDU handling. That is, when FBPDU is configured to forward STP BPDU but BPDU
protection is enabled, then the port will not forward STP BPDU.
BPDU protection also has a higher priority than the BPDU tunnel port setting in determination of BPDU
handling. That is, when a port is configured as BPDU tunnel port for STP, it will forward STP BPDU. But if
the port is BPDU protection enabled. Then the port will not forward STP BPDU.
To view the following window, click
Security > BPDU Attack Protection
, as shown below:
Figure 9-62 BPDU Attack Protection window
The fields that can be configured are described below:
Parameter
Description
BPDU Attack Protection State
Select to enable or disable the BPDU attack protection feature’s global
state here.
BPDU Attack Protection Trap
State
Select to enable or disable the BPDU attack protection feature’s trap
state here.
Unit
Select the switch unit that will be used for this configuration here.
From Port / To Port
Select the appropriate port range used for the configuration here.
State
Select to enable or disable the BPDU attack protection feature’s state
on the port(s) specified.
Mode
Select the BPDU attack protection feature’s mode that will be applied
to the port(s) specified. Options to choose from are
Drop
,
Block
and
Shutdown
.
Drop
– Drop all received BPDU packets when the port enters under
attack state.
Block
– Drop all packets (include BPDU and normal packets) when the
port enters under attack state.