Juniper JUNOS OS 10.3 - SOFTWARE Manual page 2621

For ex series ethernet switches
Hide thumbs Also See for JUNOS OS 10.3 - SOFTWARE:
Table of Contents

Advertisement

Related
Documentation
Copyright © 2010, Juniper Networks, Inc.
directly with other hosts. Instead, all communications between hosts go through the
switch.
Restricted proxy ARP—The switch does not respond to an ARP request if the physical
networks of the source and target of the ARP request are the same. It does not matter
whether the destination host has the same IP address as the incoming interface or a
different (remote) IP address. An ARP request for a broadcast address elicits no reply.
Device Security—Storm control permits the switch to monitor unknown unicast and
broadcast traffic and drop packets, or shut down, or temporarily disable the interface
when a specified traffic level is exceeded, thus preventing packets from proliferating and
degrading the LAN. You can enable storm control on access interfaces or trunk interfaces.
Firewall Filters—Allow auditing of various types of security violations, including attempts
to access the switch from unauthorized locations. Firewall filters can detect such attempts
and create audit log entries when they occur. The filters can also restrict access by limiting
traffic to source and destination MAC addresses, specific protocols, or, in combination
with policers, to specified data rates to prevent denial of service (DoS) attacks.
Policers—Provide rate-limiting capability to control the amount of traffic that enters an
interface, which acts to counter DoS attacks.
Encryption Standards—Supported standards include:
128-, 192-, and 256-bit Advanced Encryption Standard (AES)
56-bit Data Encryption Standard (DES) and 168-bit 3DES
802.1X for EX Series Switches Overview on page 2531
Firewall Filters for EX Series Switches Overview on page 3001
Port Security for EX Series Switches Overview on page 2825
Understanding Proxy ARP on EX Series Switches on page 1301
Understanding Storm Control on EX Series Switches on page 2791
Understanding the Use of Policers in Firewall Filters on page 3036
Chapter 81: 802.1X and MAC RADIUS Authentication Overview
2525

Advertisement

Table of Contents
loading

Table of Contents