Network security support
3.8
Secure the redundancy protocols used
50
UM Security BRS-2A
Release
8.7
05/2022
3.8
Secure the redundancy protocols used
Note:
Securing the redundancy protocols used can also help you enhance and maintain the
availability of your network infrastructure.
3.8.1
Secure RSTP guards and helper protocols
Secure RSTP guards. See the user manual "Graphical User Interface" on how to configure RSTP
guards.
Secure RSTP helper protocols:
Consider disabling the L2 loop protection. This helps protecting against a Denial-of-Service
attack if malicious loop protection frames are sent to the device with the intention to trick it into
disabling its respective port.
Note:
The delivery state for the L2 loop protection is disabled.
3.8.2
Secure MRP
Secure MRP (MRP VLAN ID ≥2, tagged packets). This may require an existing VLAN plan.
See the user manual "Graphical User Interface" on how to configure MRP.
3.8.3
Secure HIPER Ring
Secure HIPER Ring (VLAN ID 1: tagged packets). This may require an existing VLAN plan with a
device management VLAN ID ≥2.
See the user manual "Graphical User Interface" on how to configure the HIPER Ring and VLANs.
3.8.4
Secure Ring/Network Coupling
Secure Ring/Network Coupling (VLAN ID 1: tagged packets) This may require an existing VLAN
plan with a device management VLAN ID ≥2.
See the user manual "Graphical User Interface" on how to configure Ring/Network Coupling and
VLANs.
Summary of Contents for HIRSCHMANN HiOS-2A
Page 6: ...Contents 6 UM Security BRS 2A Release 8 7 05 2022 ...
Page 8: ...Document History 8 UM Security BRS 2A Release 8 7 05 2022 ...
Page 10: ...Safety instructions 10 UM Security BRS 2A Release 8 7 05 2022 ...
Page 54: ...Network security support 3 11 Configure logging 54 UM Security BRS 2A Release 8 7 05 2022 ...
Page 62: ...Index 62 UM Security BRS 2A Release 8 7 05 2022 ...
Page 66: ......