Configuration Procedure; Displaying And Maintaining Source Mac-Based Arp Attack Detection - HPE FlexNetwork 7500 Series Security Configuration Manual

Table of Contents

Advertisement

entry for the MAC address. Before the entry ages out, the device handles the attack by using either
of the following methods:
Monitor—Only generates log messages.
Filter—Generates log messages and filters out subsequent ARP packets from the MAC
address.
Make sure you have enabled the ARP logging feature before enabling the source MAC-based ARP
attack detection feature. For information about the ARP logging feature, see Layer 3—IP Services
Configuration Guide.
You can exclude the MAC addresses of some gateways and servers from this detection. This feature
does not inspect ARP packets from those devices even if they are attackers.

Configuration procedure

To configure source MAC-based ARP attack detection:
Step
1.
Enter system view.
2.
Enable source MAC-based
ARP attack detection and
specify the handling method.
3.
Set the threshold.
4.
Set the aging timer for ARP
attack entries.
5.
(Optional.) Exclude specific
MAC addresses from this
detection.
NOTE:
When an ARP attack entry is aged out, ARP packets sourced from the MAC address in the entry can
be processed correctly.
Displaying and maintaining source MAC-based ARP attack
detection
Execute display commands in any view.
Task
(In standalone mode.) Display ARP attack
entries detected by source MAC-based ARP
attack detection.
Command
system-view
arp source-mac { filter |
monitor }
arp source-mac threshold
threshold-value
arp source-mac aging-time time
arp source-mac exclude-mac
mac-address&<1-64>
Command
display arp source-mac { slot slot-number | interface
interface-type interface-number }
419
Remarks
N/A
By default, this feature is
disabled.
When you change the handling
method from monitor to filter, the
configuration takes effect
immediately.
When you change the handling
method from filter to monitor, the
device continues filtering packets
that match existing attack entries.
The default threshold is 30.
By default, the lifetime is 300
seconds.
By default, no MAC address is
excluded.

Advertisement

Table of Contents
loading

Table of Contents