Dell PowerConnect J-EX4200-24T Software Manual page 2663

J series; j-ex series
Table of Contents

Advertisement

Overview and Topology
Table 326: Components of the Port Security Topology
Properties
Switch hardware
VLAN name and ID
VLAN subnets
Interfaces in
employee-vlan
Ethernet LANs are vulnerable to address spoofing and DoS attacks on network devices.
This example describes how to protect the switch from an attack on the DHCP snooping
database that alters the MAC addresses assigned to some clients.
This example shows how to configure port security features on a J-EX4200-24T switch
that is connected to a DHCP server.
The setup for this example includes the VLAN
for creating that VLAN is described in the topic "Example: Setting Up Bridging with Multiple
VLANs for J-EX Series Switches" on page 1070. That procedure is not repeated here. Figure
72 on page 2591 illustrates the topology for this example.
Figure 72: Network Topology for Basic Port Security
The components of the topology for this example are shown in Table 326 on page 2591.
Settings
One J-EX4200-24T, 24 ports (8 PoE ports)
employee-vlan
192.0.2.16/28
192.0.2.17
192.0.2.31
ge-0/0/1
Chapter 94: Examples: Port Security Configuration
employee-vlan
, tag
20
through
192.0.2.30
is subnet's broadcast address
,
,
,
ge-0/0/2
ge-0/0/3
ge-0/0/8
on the switch. The procedure
2591

Advertisement

Table of Contents
loading

Table of Contents