HP 6120XG HP ProCurve Series 6120 Blade Switches Access Security Guide - Page 431
Using the Instrumentation Monitor
View all HP 6120XG manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 431 highlights
Configuring Advanced Threat Protection Using the Instrumentation Monitor Using the Instrumentation Monitor The instrumentation monitor can be used to detect anomalies caused by security attacks or other irregular operations on the switch. The following table shows the operating parameters that can be monitored at pre-deter mined intervals, and the possible security attacks that may trigger an alert: Parameter Name pkts-to-closed-ports arp-requests ip-address-count system-resource-usage login-failures/min port-auth-failures/min system-delay mac-address-count mac-moves/min learn-discards/min Description The count of packets per minute sent to closed TCP/UDP ports. An excessive amount of packets could indicate a port scan, in which an attacker is attempting to expose a vulnerability in the switch. The count of ARP requests processed per minute. A large amount of ARP request packets could indicate an host infected with a virus that is trying to spread itself. The number of destination IP addresses learned in the IP forwarding table. Some attacks fill the IP forwarding table causing legitimate traffic to be dropped. The percentage of system resources in use. Some Denial-ofService (DoS) attacks will cause excessive system resource usage, resulting in insufficient resources for legitimate traffic. The count of failed CLI login attempts or SNMP management authentication failures. This indicates an attempt has been made to manage the switch with an invalid login or password. Also, it might indicate a network management station has not been configured with the correct SNMP authentication param eters for the switch. The count of times a client has been unsuccessful logging into the network The response time, in seconds, of the CPU to new network events such as BPDU packets or packets for other network protocols. Some DoS attacks can cause the CPU to take too long to respond to new network events, which can lead to a breakdown of Spanning Tree or other features. A delay of several seconds indicates a problem. The number of MAC addresses learned in the forwarding table. Some attacks fill the forwarding table so that new conversa tions are flooded to all parts of the network. The average number of MAC address moves from one port to another per minute. This usually indicates a network loop, but can also be caused by DoS attacks. Number of MAC address learn events per minute discarded to help free CPU resources when busy. 10-33