From HP FlexFabric Switch L2S Security Technical Implementation Guide
Part of SRG-NET-000362-L2S-000025
Associated with: CCI-002385
In an enterprise network, devices under administrative control are trusted sources. These devices include the switches, routers, and servers in the network. Host ports and unknown Dynamic Host Configuration Protocol (DHCP) servers are considered untrusted sources. An unknown DHCP server on the network on an untrusted port is called a spurious DHCP server--
Review the HP FlexFabric Switch configuration and verify that DHCP snooping is enabled on a per-VLAN basis. If the HP FlexFabric Switch does not have DHCP snooping enabled for all user VLANs to validate DHCP messages from untrusted sources as well as rate-limit DHCP traffic, this is a finding. Note: Enabling DHCP snooping on a range of VLANs is permissible. Sample output: [HP]dhcp snooping enable [HP-GigabitEthernet1/0/1]dhcp snooping rate-limit
Configure the HP FlexFabric Switch to have DHCP snooping for all user VLANs to validate DHCP messages from untrusted sources as well as rate-limit DHCP traffic. [HP]dhcp snooping enable [HP-GigabitEthernet1/0/1]dhcp snooping rate-limit
Lavender hyperlinks in small type off to the right (of CSS
class id
, if you view the page source) point to
globally unique URIs for each document and item. Copy the
link location and paste anywhere you need to talk
unambiguously about these things.
You can obtain data about documents and items in other
formats. Simply provide an HTTP header Accept:
text/turtle
or
Accept: application/rdf+xml
.
Powered by sagemincer