Configuring Arp Packet Source Mac Consistency Check; Configuring Arp Active Acknowledgement - HP VSR1000 Security Configuration Manual

Virtual services router
Table of Contents

Advertisement

1.
Enable source MAC-based ARP attack detection and specify the handling method as filter.
2.
Set the threshold.
3.
Set the lifetime for ARP attack entries.
4.
Exclude the MAC address of the server from this detection.
Configuration procedure
# Enable source MAC-based ARP attack detection, and specify the handling method as filter.
<Device> system-view
[Device] arp source-mac filter
# Set the threshold to 30.
[Device] arp source-mac threshold 30
# Set the lifetime for ARP attack entries to 60 seconds.
[Device] arp source-mac aging-time 60
# Exclude MAC address 0012-3f86-e94c from this detection.
[Device] arp source-mac exclude-mac 0012-3f86-e94c
Configuring ARP packet source MAC consistency
check
This feature enables a gateway to filter out ARP packets whose source MAC address in the Ethernet
header is different from the sender MAC address in the message body, so that the gateway can learn
correct ARP entries.
To enable ARP packet source MAC address consistency check:
Step
1.
Enter system view.
2.
Enable ARP packet source MAC address
consistency check.

Configuring ARP active acknowledgement

Configure this feature on gateways to prevent user spoofing.
ARP active acknowledgement prevents a gateway from generating incorrect ARP entries. For more
information about its working mechanism, see ARP Attack Protection Technology White Paper.
In strict mode, a gateway can learn an entry only when ARP active acknowledgement is based on the
correct ARP resolution.
To configure ARP active acknowledgement:
Step
1.
Enter system view.
Command
system-view
arp valid-check enable
Command
system-view
317
Remarks
N/A
By default, ARP packet source
MAC address consistency check
is disabled.
Remarks
N/A

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents