Displaying And Maintaining Source Mac-Based Arp Attack Detection; Configuration Example - HP VSR1000 Security Configuration Manual

Virtual services router
Table of Contents

Advertisement

NOTE:
When an ARP attack entry expires, ARP packets sourced from the MAC address in the entry can be
processed correctly.
Displaying and maintaining source MAC-based ARP attack
detection
Execute display commands in any view.
Task
Display ARP attack entries detected by source
MAC-based ARP attack detection.

Configuration example

Network requirements
As shown in
a large number of ARP requests to the gateway, the gateway might crash and cannot process requests
from the clients. To solve this problem, configure source MAC-based ARP attack detection on the
gateway.
Figure 91 Network diagram
ARP attack protection
Host A
Configuration considerations
An attacker might forge a large number of ARP packets by using the MAC address of a valid host as the
source MAC address. To prevent such attacks, configure the gateway in the following steps:
Figure
91, the hosts access the Internet through a gateway (Device). If malicious users send
IP network
Host B
Command
display arp source-mac [ interface interface-type
interface-number ]
Gateway
Device
Host C
316
Server
0012-3f 86-e 94c
Host D

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents