Chapter 94 Examples: Port Security Configuration - Dell PowerConnect J-EX4200-24T Software Manual

J series; j-ex series
Table of Contents

Advertisement

CHAPTER 94
Examples: Port Security Configuration
Example: Configuring Port Security, with DHCP Snooping, DAI, MAC Limiting, and MAC
Move Limiting, on a J-EX Series Switch
Example: Configuring Port Security, with DHCP Snooping, DAI, MAC Limiting, and MAC
Move Limiting, on a J-EX Series Switch on page 2569
Example: Configuring MAC Limiting, Including Dynamic and Allowed MAC Addresses,
to Protect the Switch from Ethernet Switching Table Overflow Attacks on page 2576
Example: Configuring a DHCP Server Interface as Untrusted to Protect the Switch from
Rogue DHCP Server Attacks on page 2579
Example: Configuring MAC Limiting to Protect the Switch from DHCP Starvation
Attacks on page 2583
Example: Configuring DHCP Snooping and DAI to Protect the Switch from ARP Spoofing
Attacks on page 2586
Example: Configuring Allowed MAC Addresses to Protect the Switch from DHCP
Snooping Database Alteration Attacks on page 2590
Example: Configuring DHCP Snooping, DAI , and MAC Limiting on a J-EX Series Switch
with Access to a DHCP Server Through a Second Switch on page 2593
Example: Configuring IP Source Guard with Other J-EX Series Switch Features to
Mitigate Address-Spoofing Attacks on Untrusted Access Interfaces on page 2600
Example: Configuring IP Source Guard on a Data VLAN That Shares an Interface with
a Voice VLAN on page 2608
Example: Setting Up DHCP Option 82 with a J-EX Series Switch as Relay Agent Between
Clients and a DHCP Server on page 2615
Example: Setting Up DHCP Option 82 on a J-EX Series Switch with No Relay Agent
Between Clients and DHCP Server on page 2617
Example: Configuring Proxy ARP on a J-EX Series Switch on page 2621
You can configure DHCP snooping, dynamic ARP inspection (DAI), MAC limiting, and
MAC move limiting on the access ports of J-EX Series switches to protect the switch and
the Ethernet LAN against address spoofing and Layer 2 denial-of-service (DoS) attacks.
You can also configure a trusted DHCP server and specific (allowed) MAC addresses for
the switch interfaces.
2569

Advertisement

Table of Contents
loading

Table of Contents