Allied Telesis AT-S63 User Manual

Page 6

Advertising
background image

Contents

6

Voice Applications ....................................................................................................................................169
Video Applications ....................................................................................................................................171
Critical Database ......................................................................................................................................173
Policy Component Hierarchy ....................................................................................................................174

Chapter 15: Denial of Service Defenses ....................................................................................................177
Supported Platforms .......................................................................................................................................178
Overview .........................................................................................................................................................179
SYN Flood Attack............................................................................................................................................180
Smurf Attack ...................................................................................................................................................181
Land Attack .....................................................................................................................................................182
Teardrop Attack ..............................................................................................................................................184
Ping of Death Attack .......................................................................................................................................185
IP Options Attack ............................................................................................................................................186
Mirroring Traffic...............................................................................................................................................187
Denial of Service Defense Guidelines ............................................................................................................188

Chapter 16: Power Over Ethernet ...............................................................................................................189
Supported Platforms .......................................................................................................................................190
Overview .........................................................................................................................................................191
Power Budgeting.............................................................................................................................................192
Port Prioritization.............................................................................................................................................193
PoE Device Classes .......................................................................................................................................194

Section III: Snooping Protocols ..............................................................................195

Chapter 17: Internet Group Management Protocol Snooping .................................................................197
Supported Platforms .......................................................................................................................................198
Overview .........................................................................................................................................................199

Chapter 18: Multicast Listener Discovery Snooping ................................................................................201
Supported Platforms .......................................................................................................................................202
Overview .........................................................................................................................................................203

Chapter 19: Router Redundancy Protocol Snooping ...............................................................................205
Supported Platforms .......................................................................................................................................206
Overview .........................................................................................................................................................207
Guidelines .......................................................................................................................................................208

Chapter 20: Ethernet Protection Switching Ring Snooping ....................................................................209
Supported Platforms .......................................................................................................................................210
Overview .........................................................................................................................................................211
Restrictions .....................................................................................................................................................213
Guidelines .......................................................................................................................................................215

Section IV: SNMPv3 ................................................................................................217

Chapter 21: SNMPv3 ....................................................................................................................................219
Supported Platforms .......................................................................................................................................220
Overview .........................................................................................................................................................221
SNMPv3 Authentication Protocols ..................................................................................................................222
SNMPv3 Privacy Protocol...............................................................................................................................223
SNMPv3 MIB Views........................................................................................................................................224
SNMPv3 Storage Types .................................................................................................................................226
SNMPv3 Message Notification .......................................................................................................................227
SNMPv3 Tables ..............................................................................................................................................228

Advertising