Home > Cisco > Switch > Cisco Sg3008 Manual

Cisco Sg3008 Manual

Here you can view all the pages of manual Cisco Sg3008 Manual. The Cisco manuals for Switch are available online for free. You can easily download all the documents as PDF.

Page 391

Security
Configuring Port Security
354 Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 
18
•Storm Control Mode—Select one of the modes: 
-Unknown Unicast, Multicast & Broadcast—Counts unknown Unicast, 
Broadcast, and Multicast traffic towards the bandwidth threshold.
-Multicast & Broadcast—Counts Broadcast and Multicast traffic towards 
the bandwidth threshold.
-Broadcast Only—Counts only Broadcast traffic towards the bandwidth 
threshold.
STEP  4Click...

Page 392

Security
Configuring Port Security
Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version)  355
18
 
When a frame from a new MAC address is detected on a port where it is not 
authorized (the port is classically locked, and there is a new MAC address, or the 
port is dynamically locked, and the maximum number of allowed addresses has 
been exceeded), the protection mechanism is invoked, and one of the following 
actions can take place:
•Frame is discarded...

Page 393

Security
802.1X
356 Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 
18
-Secure Permanent—Keeps the current dynamic MAC addresses 
associated with the port and learns up to the maximum number of 
addresses allowed on the port (set by Max No. of Addresses Allowed). 
Relearning and aging are enabled. 
-Secure Delete on Reset—Deletes the current dynamic MAC addresses 
associated with the port after reset. New MAC addresses can be learned 
as...

Page 394

Security
Denial of Service Prevention
Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version)  357
18
 
Denial of Service Prevention 
A Denial of Service (DoS) attack is a hacker attempt to make a device unavailable 
to its users. 
DoS attacks saturate the device with external communication requests, so that it 
cannot respond to legitimate traffic. These attacks usually lead to a device CPU 
overload.
Secure Core Technology (SCT ) 
One method of resisting DoS...

Page 395

Security
Denial of Service Prevention
358 Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 
18
•Martian Addresses—Martian addresses are illegal from the point of view of 
the IP protocol. See Martian Addresses for more details.
•ICMP Attack—Sending malformed ICMP packets or overwhelming number 
of ICMP packets to the victim that might lead to a system crash. 
•IP Fragmentation—Mangled IP fragments with overlapping, over-sized 
payloads are sent to the...

Page 396

Security
Denial of Service Prevention
Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version)  359
18
 
•Prevent TCP connections from a specific interface (SYN Filtering page) and 
rate limit the packets (SYN Rate Protection page)
•Configure the blocking of certain ICMP packets (ICMP Filtering page)
•Discard fragmented IP packets from a specific interface (IP Fragments 
Filtering page)
•Deny attacks from Stacheldraht Distribution, Invasor Trojan, and Back...

Page 397

Security
Denial of Service Prevention
360 Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 
18
STEP 1Click Security > Denial of Service Prevention > Security Suite Settings. The 
Security Suite Settings displays.
CPU Protection Mechanism: Enabled indicates that SCT is enabled. 
STEP  2Click Details beside CPU Utilization to go to the CPU Utilization page and view 
CPU resource utilization information.
STEP  3Click Edit beside TCP SYN Protection to go to...

Page 398

Security
Denial of Service Prevention
Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version)  361
18
 
SYN Protection
The network ports might be used by hackers to attack the device in a SYN attack, 
which consumes TCP resources (buffers) and CPU power. 
Since the CPU is protected using SCT, TCP traffic to the CPU is limited. However, if 
one or more ports are attacked with a high rate of SYN packets, the CPU receives 
only the attacker packets, thus creating...

Page 399

Security
Denial of Service Prevention
362 Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 
18
•Current Status—Interface status. The possible values are:
-Normal—No attack was identified on this interface.
-Blocked—Traffic is not forwarded on this interface.
-Attacked—Attack was identified on this interface.
•Last Attack—Date of last SYN-FIN attack identified by the system and the 
system action (Reported or Blocked and Reported).
Martian Addresses
The...

Page 400

Security
Denial of Service Prevention
Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version)  363
18
 
STEP  3To add a Martian address click Add.
STEP  4Enter the parameters.
•IP Version—Indicates the supported IP version. Currently, support is only 
of fere d for IP v4.
•IP Address—Enter an IP addresses to reject. The possible values are:
-
From Reserved List—Select a well-known IP address from the reserved 
list.
-
New IP Address—Enter an IP address....
Start reading Cisco Sg3008 Manual

Related Manuals for Cisco Sg3008 Manual

All Cisco manuals