Huawei Quidway S9300 Configuration Manual page 9

Terabit routing switch v100r001c03
Table of Contents

Advertisement

Quidway S9300 Terabit Routing Switch
Configuration Guide - Security
Figure 1-1 Networking diagram for using RADIUS to authenticate users........................................................1-33
Figure 2-1 Networking diagram for applying DHCP snooping on the S9300 on a Layer 2 network..................2-3
...............................................................................................................................................................................2-3
Figure 2-3 Networking diagram for preventing the bogus DHCP server attack................................................2-25
address leases......................................................................................................................................................2-30
Figure 2-7 Networking diagram for configuring DHCP snooping....................................................................2-35
Figure 3-1 Diagram of IP/MAC spoofing attack..................................................................................................3-2
Figure 3-2 Networking diagram for configuring IP source guard........................................................................3-6
Figure 4-1 Networking diagram for configuring ARP security functions.........................................................4-20
Figure 4-2 Networking diagram for prevent man-in-the-middle attacks...........................................................4-24
Figure 5-1 Networking diagram for configuring traffic suppression...................................................................5-5
Figure 6-1 Networking diagram for configuring IP source trail..........................................................................6-5
Figure 7-1 Networking diagram of URPF............................................................................................................7-2
Figure 7-2 Networking diagram for configuring URPF.......................................................................................7-6
Figure 8-1 Networking diagram for disabling URPF for the specified traffic...................................................8-13
Figure 8-2 Networking diagram for configuring IPv4 ACLs.............................................................................8-16
Figure 8-3 Networking diagram for configuring frame header-based ACLs.....................................................8-20
Figure 8-4 Networking diagram for configuring the blacklist and whitelist......................................................8-22
Issue 01 (2009-07-28)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
Figures
Figures
vii

Advertisement

Table of Contents
loading

Table of Contents