Configuring Intranet Security
Context
A typical large- and medium-sized campus network uses a three-layer architecture, consisting of the core layer, aggregation layer, and access layer. Simplified networks may use a two-layer architecture, consisting of only the core layer and access layer. Security features can be configured layer by layer to ensure comprehensive intranet security.
Configuration Tasks
Network Layer |
Task Description |
Deployment Procedure |
---|---|---|
Access layer |
Enabling storm control |
|
Enabling DHCP snooping |
||
Enabling IP Source Guard (IPSG) |
||
Enabling dynamic ARP inspection (DAI) |
||
Enabling port isolation |
||
Access layer (wireless side) |
Configuring air interface security |
You need to log in to the WAC web system or access the WAC command-line interface (CLI) to perform the configuration. For details about the planned functions, see the plan for the wireless access layer in Intranet Security Design.
|
Configuring terminal access security |
||
Configuring service security |
||
Aggregation layer |
|
|
Core layer |
Configuring defense against CPU attacks |
All the listed functions of the core switch have default configurations. These configurations ensure that the CPU can process and respond to normal services. You can run commands on the core switch to customize these functions. For details, see the campus switch product documentation at: https://support.huawei.com/enterprise/en/category/switches-pid-1482605678974?submodel=9856733 |
Configuring attack source tracing |
||
Configuring port attack defense |
||
Configuring user-level rate limiting |
||
Enabling optimized ARP reply |