3com S7906E 安装指导
Features
Description
IP Source Guard
By filtering packets on a per-port basis, IP source guard prevents illegal
packets from traveling through, thus improving the network security. This
document describes:
packets from traveling through, thus improving the network security. This
document describes:
z
Configuring a Static Binding Entry
z
Configuring Dynamic Binding Function
SSH2.0
SSH ensures secure login to a remote device in a non-secure network
environment. By encryption and strong authentication, it protects the
device against attacks. This document describes:
environment. By encryption and strong authentication, it protects the
device against attacks. This document describes:
z
Configuring Asymmetric Keys
z
Configuring the Device as an SSH Server
z
Configuring the Device as an SSH Client
z
Configuring an SFTP Server
z
Configuring an SFTP Client
Public Key
This document describes Public Key Configuration.
ACL
An ACL is used for identifying traffic based on a series of preset matching
criteria. This document describes:
criteria. This document describes:
z
ACL overview and ACL types
z
ACL configuration
ARP Attack Protection
Currently, ARP attacks and viruses are threatening LAN security. The
device can provide multiple features to detect and prevent such attacks.
This document describes:
device can provide multiple features to detect and prevent such attacks.
This document describes:
z
ARP Attack Protection Overview
z
Configuring ARP Defense Against IP Packet Attacks
z
Configuring ARP Active Acknowledgement
z
Configuring Source MAC Address Based ARP Attack Detection
z
Configuring ARP Packet Rate Limit
z
Configuring ARP Detection
URPF
Unicast Reverse Path Forwarding (URPF) protects a network against
source address spoofing attacks. This document describes:
source address spoofing attacks. This document describes:
z
URPF Overview
z
URPF Configuration