Method and network equipment preventing media access control (MAC) address table from overflowing and attacking
A MAC address table and network device technology, applied in the field of network security, can solve the problems of bandwidth waste, occupation, and waste of CPU and Mac address table item resources of network devices, and achieve the effect of preventing overflow attacks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0018] In order to make the objectives, technical solutions, and advantages of the application more clear, the application will be described in detail below through specific embodiments and with reference to the drawings.
[0019] In this application, the network device is first configured to enable the anti-mac address table overflow test function, and then the network device starts to detect the anti-mac address table overflow attack, that is, the network device obtains its ports according to the preset time period. Learn the number of Mac address table entries in a time period, and mark the port as a suspicious port when the number of Mac address table entries learned by any port in the time period reaches the first threshold;
[0020] When the number of all Mac address entries learned by the network device reaches the second threshold, if the number of Mac address entries learned by the suspicious port exceeds the threshold threshold of the number of Mac address entries configur...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com