3Com S7906E Configuration Manual page 19

S7900e family release 6600 series
Hide thumbs Also See for S7906E:
Table of Contents

Advertisement

Features
Portal
Port Security
IP Source Guard
SSH2.0
Public Key
ACL
ARP Attack Protection
URPF
Portal authentication, as its name implies, helps control access to the
Internet. This document describes:
Portal overview
Portal configuration
Port security is a MAC address-based security mechanism for network
access controlling. It is an extension to the existing 802.1X authentication
and MAC authentication. This document describes:
Enabling Port Security
Setting the Maximum Number of Secure MAC Addresses
Setting the Port Security Mode
Configuring Port Security Features
Configuring Secure MAC Addresses
Ignoring Authorization Information from the Server
By filtering packets on a per-port basis, IP source guard prevents illegal
packets from traveling through, thus improving the network security. This
document describes:
Configuring a Static Binding Entry
Configuring Dynamic Binding Function
SSH ensures secure login to a remote device in a non-secure network
environment. By encryption and strong authentication, it protects the
device against attacks. This document describes:
Configuring Asymmetric Keys
Configuring the Device as an SSH Server
Configuring the Device as an SSH Client
Configuring an SFTP Server
Configuring an SFTP Client
This document describes Public Key Configuration.
An ACL is used for identifying traffic based on a series of preset matching
criteria. This document describes:
ACL overview and ACL types
ACL configuration
Currently, ARP attacks and viruses are threatening LAN security. The
device can provide multiple features to detect and prevent such attacks.
This document describes:
ARP Attack Protection Overview
Configuring ARP Defense Against IP Packet Attacks
Configuring ARP Active Acknowledgement
Configuring Source MAC Address Based ARP Attack Detection
Configuring ARP Packet Rate Limit
Configuring ARP Detection
Unicast Reverse Path Forwarding (URPF) protects a network against
source address spoofing attacks. This document describes:
URPF Overview
URPF configuration
2-11
Description

Hide quick links:

Advertisement

Chapters

Table of Contents
loading

This manual is also suitable for:

S7910eS7906e-vS7903eS7903e-sS7902e

Table of Contents