Displaying And Maintaining Source Mac-Based Arp Attack Detection; Source Mac-Based Arp Attack Detection Configuration Example - HP 10500 Series Configuration Manual

Security configuration guide
Hide thumbs Also See for 10500 Series:
Table of Contents

Advertisement

Step
4.
Configure the lifetime for ARP
attack entries.
Configure excluded MAC
5.
addresses.
After an ARP attack detection entry expires, ARP packets sourced from the MAC address in the entry can
be processed normally.
Displaying and maintaining source MAC-based ARP attack
detection
Task
Display attacking MAC addresses
detected by source MAC-based ARP
attack detection. (In standalone mode.)
Display attacking MAC addresses
detected by source MAC-based ARP
attack detection. (In IRF mode.)
Source MAC-based ARP attack detection configuration
example
Network requirements
As shown in
a large number of ARP requests to the gateway, the gateway may crash and cannot process requests
from the clients. To solve this problem, configure source MAC-based ARP attack detection on the
gateway.
Figure
99, the hosts access the Internet through a gateway (Device). If malicious users send
Command
arp anti-attack source-mac
aging-time time
arp anti-attack source-mac
exclude-mac mac-address&<1-10>
Command
display arp anti-attack source-mac { slot
slot-number | interface interface-type
interface-number } [ | { begin | exclude |
include } regular-expression ]
display arp anti-attack source-mac
{ chassis chassis-number slot slot-number
| interface interface-type
interface-number } [ | { begin | exclude |
include } regular-expression ]
255
Remarks
Optional.
300 seconds by default.
Optional.
No MAC address is excluded by
default.
Remarks
Available in any view.
Available in any view.

Advertisement

Table of Contents
loading

Table of Contents