The NetEngine 8000 F supports various security attributes that can be deployed in a bridge domain to help devices securely transmit packets.
Table 1 describes the security functions deployed in a bridge domain to help devices securely transmit packets.
Security Function |
Description |
Usage Scenario |
---|---|---|
Limit on packet transmission between EVC Layer 2 sub-interfaces within a bridge domain |
An EVC Layer 2 sub-interface can be disabled from broadcasting received broadcast packets, unknown unicast packets, and unknown multicast packets to other EVC Layer 2 sub-interfaces in the same bridge domain. Forwarding malicious unknown unicast packets increases device resource consumption. As a result, device performance deteriorates, or a device breaks down. Preventing an EVC Layer 2 sub-interface from broadcasting received packets to other EVC Layer 2 sub-interfaces in the same bridge domain prevents attacks initiated using unknown packets. |
This function applies to networks without user changes or networks with static MAC address-based forwarding paths. |
Limit on MAC address learning within a bridge domain |
If a bridge domain has only one inbound interface and one outbound interface, to save MAC address entries, the MAC address learning function can be disabled in a bridge domain. This function helps efficiently use the MAC address table space. The network has high security. |
This function applies to networks without user changes or networks with static MAC address-based forwarding paths. If static MAC addresses are used and a great number of users access a switch, information about each user must be configured to establish a forwarding path. This increases the workload of the network administrator. New users cannot access a device that has this function enabled. |
Split horizon |
A bridge domain is a broadcast domain, in which an EVC Layer 2 sub-interface broadcasts received packets within the domain. To reduce the broadcast volume, EVC Layer 2 sub-interfaces that do not need to communicate can be isolated from one another in the same bridge domain. To meet this requirement, enable split horizon to isolate EVC Layer 2 sub-interfaces from one another in the bridge domain. |
Split horizon applies to all Layer 2 networks. |
Before configuring EVC security attributes, create a bridge domain.