Security > Safeguard Engine; Security > Cpu Protect; Security > Arp Spoofing Prevention - D-Link DES-1210/ME Series Manual

Metro ethernet managed switch
Table of Contents

Advertisement

4 Configuration
To define a management station IP setting, click the Add Host button and type in the IP address and Subnet
mask. Click the Apply button to save your settings. You may permit only single or a range of IP addresses
by different IP mask settings, the format can either be 192.168.1.1/255.255.255.0 or 192.168.0.1/24. Please
see the example below for permitting the IP range
IP Address
192.168.0.1
172.17.5.215
To delete the IP address, simply click the Delete button. Check the unwanted address, and then click Apply.
Security > Safeguard Engine
D-Link's Safeguard Engine is a robust and innovative technology that automatically throttles the impact of
packet flooding into the switch's CPU. This function helps protect the Switch from being interrupted by
malicious viruses or worm attacks. This option is enabled by default.
Security > CPU Protect
The CPU Protect setting page allows user to view and configure the CPU protection type settings.
CPU Protect State: Specifies the CPU protect state to be enabled or disabled.
Click the Apply button to accept the changes made.
The CPU Protect Types are ARP, BPDU, ICMP, IGMP and SNMP. Select the CPU Protect Type and enter
the Rate limit which the value is between 0 and 65535 pps. The default value is no limit.
Click the Apply button to save your settings.
Security > ARP Spoofing Prevention
ARP spoofing, also known as ARP poisoning, is a method to attack an Ethernet network by allowing an
attacker to sniff data frames on a LAN, modifying the traffic, or stopping the traffic (known as a Denial of
Service – DoS attack). The main idea of ARP spoofing is to send fake or spoofed ARP messages to an
Ethernet network. It associates the attacker's or random MAC address with the IP address of another node
such as the default gateway. Any traffic meant for that IP address would be mistakenly re-directed to the
node specified by the attacker.
A common DoS attack today can be done by associating a nonexistent or specified MAC address to the IP
address of the network's default gateway. The malicious attacker only needs to broadcast one gratuitous
DES-1210/ME Series Metro Ethernet Managed Switch User Manual
Figure 4.124 - Security > Trusted Host
Subnet Mask
Permitted IP
255.255.255.0
192.168.0.1~192.168.0.255
255.0.0.0
172.0.0.1~172.255.255.255
Figure 4.125 – Security > Safeguard Engine
Figure 4.126 – Security > CPU Protect
7
7
9
9

Advertisement

Table of Contents
loading

This manual is also suitable for:

Des-1210-52/me

Table of Contents