Allied Telesis AT-S63 User Manual
Page 447
AT-S63 Management Software Command Line User’s Guide
Section II: Advanced Operations
447
Note
This defense mechanism requires some involvement by the switch’s
CPU, though not as much as the Teardrop defense. This will not
impact the forwarding of traffic between the switch ports, but it can
affect the handling of CPU events, like the processing of IGMP
packets and spanning tree BPDUs. For this reason, Allied Telesis
recommends limiting the use of this defense to only those ports
where an attack is likely to originate.
You can use the MIRRORING parameter to copy the offending traffic to a
destination port mirror for analysis with a data analyzer. To define the
destination port, refer to “SET SWITCH MIRROR” on page 238.
Example
The following command activates the defense on ports 1 and 5:
set dos pingofdeath port=1,5 state=enable