Overview and Topology
Table 325: Components of the Port Security Topology
Properties
Switch hardware
VLAN name and ID
Configured the VLAN
employee-vlan
Ethernet LANs are vulnerable to address spoofing and DoS attacks on network devices.
This example describes how to protect the switch against one common type of attack,
an ARP spoofing attack.
In an ARP spoofing attack, the attacker sends faked ARP messages, thus creating various
types of mischief on the LAN—for example, the attacker might launch a man-in-the
middle attack.
This example shows how to configure port security features on a J-EX4200-24T switch
that is connected to a DHCP server. The setup for this example includes the VLAN
employee-vlan
on the switch. The procedure for creating that VLAN is described in the
topic "Example: Setting Up Bridging with Multiple VLANs for J-EX Series Switches" on
page 1070. That procedure is not repeated here. Figure 71 on page 2587 illustrates the topology
for this example.
Figure 71: Network Topology for Basic Port Security
The components of the topology for this example are shown in Table 325 on page 2587.
Settings
One J-EX4200-24T, 24 ports (8 PoE ports)
employee-vlan
Chapter 94: Examples: Port Security Configuration
on the switch.
, tag
20
2587