EasyManua.ls Logo

Allied Telesis AT-S63 - Page 6

Allied Telesis AT-S63
538 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Contents
6
Voice Applications ....................................................................................................................................169
Video Applications ....................................................................................................................................171
Critical Database ......................................................................................................................................173
Policy Component Hierarchy ....................................................................................................................174
Chapter 15: Denial of Service Defenses ....................................................................................................177
Supported Platforms .......................................................................................................................................178
Overview .........................................................................................................................................................179
SYN Flood Attack............................................................................................................................................180
Smurf Attack ...................................................................................................................................................181
Land Attack .....................................................................................................................................................182
Teardrop Attack ..............................................................................................................................................184
Ping of Death Attack .......................................................................................................................................185
IP Options Attack ............................................................................................................................................186
Mirroring Traffic...............................................................................................................................................187
Denial of Service Defense Guidelines ............................................................................................................188
Chapter 16: Power Over Ethernet ...............................................................................................................189
Supported Platforms .......................................................................................................................................190
Overview .........................................................................................................................................................191
Power Budgeting.............................................................................................................................................192
Port Prioritization.............................................................................................................................................193
PoE Device Classes .......................................................................................................................................194
Section III: Snooping Protocols ..............................................................................195
Chapter 17: Internet Group Management Protocol Snooping .................................................................197
Supported Platforms .......................................................................................................................................198
Overview .........................................................................................................................................................199
Chapter 18: Multicast Listener Discovery Snooping ................................................................................201
Supported Platforms .......................................................................................................................................202
Overview .........................................................................................................................................................203
Chapter 19: Router Redundancy Protocol Snooping ...............................................................................205
Supported Platforms .......................................................................................................................................206
Overview .........................................................................................................................................................207
Guidelines .......................................................................................................................................................208
Chapter 20: Ethernet Protection Switching Ring Snooping ....................................................................209
Supported Platforms .......................................................................................................................................210
Overview .........................................................................................................................................................211
Restrictions .....................................................................................................................................................213
Guidelines .......................................................................................................................................................215
Section IV: SNMPv3 ................................................................................................217
Chapter 21: SNMPv3 ....................................................................................................................................219
Supported Platforms .......................................................................................................................................220
Overview .........................................................................................................................................................221
SNMPv3 Authentication Protocols ..................................................................................................................222
SNMPv3 Privacy Protocol...............................................................................................................................223
SNMPv3 MIB Views........................................................................................................................................224
SNMPv3 Storage Types .................................................................................................................................226
SNMPv3 Message Notification .......................................................................................................................227
SNMPv3 Tables ..............................................................................................................................................228

Table of Contents

Other manuals for Allied Telesis AT-S63

Related product manuals