EasyManua.ls Logo

D-Link xStack DGS-3610 Series

D-Link xStack DGS-3610 Series
703 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
xx
39.4.4 Disabling SSH SERVER ..............................................................................39-2
39.4.5 Configuring SSH Server Support Version ....................................................39-3
39.4.6 Configuring SSH User Authentication Timeout Duration .............................39-3
39.4.7 Configuring SSH Re-authentication Times ..................................................39-3
39.5 Device Management Through SSH .........................................................................................39-4
40 CPU Protection Configuration ........................................................................................................... 40-1
40.1 Overview ..................................................................................................................................40-1
40.1.1 Function of CPU Protect ..............................................................................40-1
40.1.2 Principles of CPU Protect ............................................................................40-1
40.2 Configuring CPU Protect .........................................................................................................40-2
40.2.1 Default Value of CPU Protect .......................................................................40-2
40.2.2 Configuring the Bandwidth for Each Type of Packets ..................................40-3
40.2.3 Configuring the Priority for Each Type of Packets .......................................40-3
40.3 Viewing CPU Protect Information ............................................................................................40-4
40.3.1 Viewing the statistics of Packets Received by the CPU of the Management
Board 40-4
40.3.2 Viewing the Statistics of Packets Received by the CPU of the Line Card ...40-4
40.3.3 Viewing the Statistics of Received Packets of a Specific Type ....................40-5
41 Anti-attack System Guard Configuration........................................................................................... 41-1
41.1 Overview ..................................................................................................................................41-1
41.2 Anti-attack System Guard Configuration .................................................................................41-2
41.2.1 IP Anti-Scanning Configuration Task List .....................................................41-2
41.2.2 Enabling the Anti-Attack System Guard Function of the Interface ...............41-2
41.2.3 Setting the Isolation Period for Illegal Attacking IP ......................................41-2
41.2.4 Setting the Threshold to Judge Illegal Attacking IP .....................................41-3
41.2.5 Setting the Maximum Number of Monitored IPs ..........................................41-4
41.2.6 Setting Exceptional IPs Free From Monitoring ............................................41-5
41.2.7 Clearing the Isolation Status of Isolated IPs ................................................41-5
41.2.8 Viewing Related Information of System Guard ............................................41-6
42 GSN Configuration ............................................................................................................................ 42-1
42.1 Overview of GSN Security Solution .........................................................................................42-1
42.6.1 Security Agent ..............................................................................................42-1
42.6.2 Restore System ...........................................................................................42-1
42.6.3 Security Switch ............................................................................................42-2
42.7 Configuring the GSN Security Switch ......................................................................................42-2
42.7.1 Configuring the Switch GSN Security ..........................................................42-2
42.7.2 Configuring the Communication Between SMP Servers .............................42-2

Table of Contents

Other manuals for D-Link xStack DGS-3610 Series

Related product manuals