Table Of Contents - H3C S12500R Series Configuration Examples

Switch router attack protection configuration examples
Hide thumbs Also See for S12500R Series:
Table of Contents

Advertisement

Contents
Introduction ···································································································· 1
Prerequisites ·································································································· 1
Example: Configuring link layer attack protection ··········································· 2
Network configuration ········································································································································ 2
Analysis ······························································································································································ 3
Software versions used ······································································································································ 3
Restrictions and guidelines ································································································································ 3
Procedures ························································································································································· 3
Configuring Device B ································································································································· 3
Configuring Device A ································································································································· 3
Configuring Device C ································································································································· 4
Verifying the configuration·································································································································· 5
Configuration files ·············································································································································· 5
Example: Configuring ARP attack protection ················································· 6
Network configuration ········································································································································ 6
Software versions used ······································································································································ 7
Procedures ························································································································································· 7
Verifying the configuration·································································································································· 7
Configuration files ·············································································································································· 8
Example: Configuring network layer attack protection ··································· 8
Network configuration ········································································································································ 8
Software versions used ······································································································································ 8
Restrictions and guidelines ································································································································ 9
Procedures ························································································································································· 9
Verifying the configuration·································································································································· 9
Configuration files ·············································································································································· 9
Example: Configuring transport layer attack protection ································ 10
Network configuration ······································································································································ 10
Software versions used ···································································································································· 10
Procedures ······················································································································································· 10
Verifying the configuration································································································································ 10
Configuration files ············································································································································ 11
Related documentation ················································································ 11
i

Advertisement

Table of Contents
loading

Table of Contents