Cisco Sg3008 Manual
Here you can view all the pages of manual Cisco Sg3008 Manual. The Cisco manuals for Switch are available online for free. You can easily download all the documents as PDF.
Page 401
Security Denial of Service Prevention 364 Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 18 -User Defined—Enter a port number. -All Por ts—Select to indicate that all ports are filtered. STEP 4Click Apply. The SYN filter is defined, and the Running Configuration file is updated. SYN Rate Protection The SYN Rate Protection page enables limiting the number of SYN packets received on the ingress port. This can mitigate the effect of a SYN flood...
Page 402
Security Denial of Service Prevention Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 365 18 STEP 4Click Apply. The SYN rate protection is defined, and the Running Configuration is updated. ICMP Filtering The ICMP Filtering page enables the blocking of ICMP packets from certain sources. This can reduce the load on the network in case of an ICMP attack. To define ICMP filtering: STEP 1Click Security > Denial of Service Prevention > ICMP Filtering....
Page 403
Security DHCP Snooping 366 Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 18 •Interface—Select the interface on which the IP fragmentation is being defined. •IP Address—Enter an IP network from which the fragmented IP packets is filtered or select All Addresses to block IP fragmented packets from all addresses. If you enter the IP address, enter either the mask or prefix length. •Network Mask—Select the format for the subnet mask for the source IP...
Page 404
Security IP Source Guard Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 367 18 •DHCP Snooping must be globally enabled in order to enable IP Source Guard on an interface. •IP source guard can be active on an interface only if: -DHCP Snooping is enabled on at least one of the ports VLANs -The interface is DHCP untrusted. All packets on trusted ports are for warded. •If a port is DHCP trusted, filtering of static IP addresses can be configured,...
Page 405
Security IP Source Guard 368 Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 18 Configuring IP Source Guard Work Flow To configure IP Source Guard: STEP 1Enable DHCP Snooping in the IP Configuration > DHCP > Properties page or in the Security > DHCP Snooping > Properties page. STEP 2Define the VLANs on which DHCP Snooping is enabled in the IP Configuration > DHCP > Interface Settings page. STEP 3Configure interfaces as trusted or untrusted in the...
Page 406
Security IP Source Guard Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 369 18 STEP 1Click Security > IP Source Guard > Interface Settings. STEP 2Select port/LAG from the Filter field and click Go. The ports/LAGs on this unit are displayed along with the following: •IP Source Guard —Indicates whether IP Source Guard is enabled on the port. •DHCP Snooping Trusted Interface—Indicates whether this is a DHCP trusted interface. STEP 3Select the...
Page 407
Security ARP Inspection 370 Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 18 The entries in the Binding database are displayed: •VLAN ID—VLAN on which packet is expected. •MAC Address—MAC address to be matched. •IP Address—IP address to be matched. •Interface—Interface on which packet is expected. •Status—Displays whether interface is active. •Type—Displays whether entry is dynamic or static. •Reason—If the interface is not active, displays the...
Page 408
Security ARP Inspection Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 371 18 The following shows an example of ARP cache poisoning. ARP Cache Poisoning Hosts A, B, and C are connected to the switch on interfaces A, B and C, all of which are on the same subnet. Their IP, MAC addresses are shown in parentheses; for example, Host A uses IP address IA and MAC address MA. When Host A needs to communicate with Host B at the IP layer, it broadcasts an...
Page 409
Security ARP Inspection 372 Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 18 •Trusted — Packets are not inspected. •Untrusted —Packets are inspected as described above. ARP inspection is performed only on untrusted interfaces. ARP packets that are received on the trusted interface are simply forwarded. Upon packet arrival on untrusted interfaces the following logic is implemented: •Search the ARP access control rules for the packets IP/MAC...
Page 410
Security ARP Inspection Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 373 18 Interaction Between ARP Inspection and DHCP Snooping If DHCP Snooping is enabled, ARP Inspection uses the DHCP Snooping Binding database in addition to the ARP access control rules. If DHCP Snooping is not enabled, only the ARP access control rules are used. ARP Defaults The following table describes the ARP defaults: ARP Inspection Work Flow To configure ARP...