A SERVICE OF

logo

8-2
Configuring Advanced Threat Protection
Contents
Operating Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-26
Adding an IP-to-MAC Binding to the DHCP Binding Database . . . . . 8-28
Potential Issues with Bindings . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-28
Adding a Static Binding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-29
Verifying the Dynamic IP Lockdown Configuration . . . . . . . . . . . . . . 8-29
Displaying the Static Configuration of IP-to-MAC Bindings . . . . . . . 8-30
Debugging Dynamic IP Lockdown . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-31
Using the Instrumentation Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-33
Operating Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-34
Configuring Instrumentation Monitor . . . . . . . . . . . . . . . . . . . . . . . . . 8-35
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-36
Viewing the Current Instrumentation Monitor Configuration . . . . . . 8-37