Security > Safeguard Engine; Security > Storm Control; Security > Arp Spoofing Prevention - D-Link DGS-1210-10P Reference Manual

Web smart switch web ui reference guide
Hide thumbs Also See for DGS-1210-10P:
Table of Contents

Advertisement

5 Configuration
D-Link Web Smart Switch User Manual
Click Apply to enable or disable this feature.
To configure traffic segmentation specify a port or All ports from the switch, using the From Port pull-down
menu and select To Port then click Apply to enter the settings into the Switch's Traffic Segmentation table.
Click Select All button to check all ports or click Clear button to uncheck all ports.
Security > Safeguard Engine
D-Link's Safeguard Engine is a robust and innovative technology that automatically throttles the impact of
packet flooding into the switch's CPU. This function helps protect the Web-Smart Switch from being
interrupted by malicious viruses or worm attacks. This option is enabled by default.
Figure 5.74 – Security > Safeguard Engine
Security > Storm Control
The Storm Control feature provides the ability to control the receive rate of broadcast, multicast, and
unknown unicast packets. Once a packet storm has been detected, the Switch will drop packets coming into
the Switch until the storm has subsided.
Figure 5.75 – Security > Storm Control
Storm Control Type: User can select the different Storm type from Broadcast Only, Multicast & Broadcast,
and Multicast & Broadcast & Unknown Unicast.
Threshold (64Kbps * N): If storm control is enabled (default is disabled), the threshold is from of 64 ~
1,024,000 Kbit per second, with steps (N) of 64Kbps. N can be from 1 to 16000.
Click Apply for the settings to take effect.
Security > ARP Spoofing Prevention
ARP spoofing, also known as ARP poisoning, is a method to attack an Ethernet network by allowing an
attacker to sniff data frames on a LAN, modifying the traffic, or stopping the traffic (known as a Denial of
Service – DoS attack). The main idea of ARP spoofing is to send fake or spoofed ARP messages to an
Ethernet network. It associates the attacker's or random MAC address with the IP address of another node
such as the default gateway. Any traffic meant for that IP address would be mistakenly re-directed to the
node specified by the attacker.
A common DoS attack today can be done by associating a nonexistent or specified MAC address to the IP
address of the network's default gateway. The malicious attacker only needs to broadcast one gratuitous
ARP to the network claiming to be the gateway, so that the whole network operation is turned down as all
packets to the Internet will be directed to the wrong node.
The ARP Spoofing Prevention function can discard the ARP Spoofing Attack in the network by checking the
gratuitous ARP packets and filtering those with illegal IP or MAC addresses.
60

Advertisement

Table of Contents
loading

This manual is also suitable for:

Dgs-1210-28Dgs-1210-20Dgs-1210-52Dgs-1210-28p

Table of Contents