Security Overview

 

 

 

Network Security Features

 

 

 

 

Feature

Default

Security Guidelines

More Information and

 

 

Setting

 

Configuration Details

 

 

 

 

 

 

Key

none

KMS is available in several ProCurve switch models and

Chapter 16, “Key

 

Management

 

is designed to configure and maintain key chains for use

Management System”

System (KMS)

 

with KMS-capable routing protocols that use time-

 

 

 

 

dependent or time-independent keys. (A key chain is a

 

 

 

 

set of keys with a timing mechanism for activating and

 

 

 

 

deactivating individual keys.) KMS provides specific

 

 

 

 

instances of routing protocols with one or more Send or

 

 

 

 

Accept keys that must be active at the time of a request.

 

 

Spanning Tree

none

These features prevent your switch from malicious

Protection

 

attacks or configuration errors:

 

 

BPDU Filtering and BPDU Protection: Protects the

 

 

network from denial-of-service attacks that use

 

 

spoofing BPDUs by dropping incoming BPDU frames

 

 

and/or blocking traffic through a port.

 

 

STP Root Guard: Protects the STP root bridge from

 

 

malicious attacks or configuration mistakes.

Advanced Traffic Management Guide, refer to the chapter “Multiple Instance Spanning-Tree Operation”

DHCP Snooping, none

Dynamic ARP Protection

These features provide the following additional protections for your network:

DHCP Snooping: Protects your network from common DHCP attacks, such as address spoofing and repeated address requests.

Dynamic ARP Protection: Protects your network from ARP cache poisoning.

Instrumentation Monitor. Helps identify a variety of malicious attacks by generating alerts for detected anomalies on the switch.

Chapter 11, “Configuring

Advanced Threat

Protection”

1-9