HP 3500yl Series Access Security Manual page 552

Switch software
Hide thumbs Also See for 3500yl Series:
Table of Contents

Advertisement

Configuring Advanced Threat Protection
Introduction
11-2
Attempts to fill all IP address entries in the switch's forwarding table
and cause legitimate traffic to be dropped, indicated by an increased
number of learned IP destination addresses
Attempts to spread viruses, indicated by an increased number of ARP
request packets
Attempts to exhaust system resources so that sufficient resources are
not available to transmit legitimate traffic, indicated by an unusually
high use of specific system resources
Attempts to attack the switch's CPU and introduce delay in system
response time to new network events
Attempts by hackers to access the switch, indicated by an excessive
number of failed logins or port authentication failures
Attempts to deny switch service by filling the forwarding table, indi-
cated by an increased number of learned MAC addresses or a high
number of MAC address moves from one port to another
Attempts to exhaust available CPU resources, indicated by an
increased number of learned MAC address events being discarded

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents