H3C S5500-SI Series Operation Manual page 794

Hide thumbs Also See for S5500-SI Series:
Table of Contents

Advertisement

1 ARP Attack Protection Configuration······································································································1-1
ARP Attack Protection Overview ············································································································1-1
ARP Attack Protection Configuration Task List ······················································································1-1
Configuring ARP Defense Against IP Packet Attacks ············································································1-2
Introduction······································································································································1-2
Configuring ARP Source Suppression ····························································································1-3
Enabling ARP Black Hole Routing ··································································································1-3
Displaying and Maintaining ARP Defense Against IP Packet Attacks ············································1-3
Configuring ARP Packet Rate Limit ········································································································1-3
Introduction······································································································································1-3
Configuration Procedure··················································································································1-3
Configuring Source MAC Address Based ARP Attack Detection···························································1-4
Introduction······································································································································1-4
Configuration Procedure··················································································································1-4
Displaying and Maintaining Source MAC Address Based ARP Attack Detection···························1-5
Configuring ARP Packet Source MAC Address Consistency Check ·····················································1-5
Introduction······································································································································1-5
Configuration Procedure··················································································································1-5
Configuring ARP Active Acknowledgement ····························································································1-5
Introduction······································································································································1-5
Configuration Procedure··················································································································1-5
Configuring ARP Detection ·····················································································································1-6
Introduction······································································································································1-6
Configuring ARP Detection Based on Specified Objects ································································1-6
Enabling ARP Detection Based on Static IP Source Guard Binding Entries/DHCP Snooping
Entries/802.1X Security Entries/OUI MAC Addresses ····································································1-7
Displaying and Maintaining ARP Detection·····················································································1-8
ARP Detection Configuration Example I ·························································································1-8
ARP Detection Configuration Example II ······················································································1-10
Configuring ARP Automatic Scanning and Fixed ARP·········································································1-11
Introduction····································································································································1-11
Configuration Procedure················································································································1-11
Configuring ARP Gateway Protection···································································································1-12
Introduction····································································································································1-12
Configuration Procedure················································································································1-12
ARP Gateway Protection Configuration Example ·········································································1-13
Configuring ARP Filtering ·····················································································································1-14
Introduction····································································································································1-14
Configuration Procedure················································································································1-14
ARP Filtering Configuration Example····························································································1-14
Table of Contents
i

Advertisement

Chapters

Table of Contents
loading

Table of Contents