Displaying And Maintaining Source Mac Address Based Arp Attack Detection; Source Mac Address Based Arp Attack Detection Configuration Example - HP 3600 v2 Series Security Configuration Manual

Hide thumbs Also See for 3600 v2 Series:
Table of Contents

Advertisement

Displaying and maintaining source MAC address based ARP
attack detection
To do...
Display attacking MAC addresses detected
by source MAC address based ARP attack
detection
Source MAC address based ARP attack detection
configuration example
Network requirements
As shown in
a large number of ARP requests to the gateway, the gateway may crash and cannot process requests
from the clients. To solve this problem, configure source MAC address based ARP attack detection on the
gateway.
Figure 127 Network diagram
ARP attack protection
Host A
Configuration considerations
An attacker may forge a large number of ARP packets by using the MAC address of a valid host as the
source MAC address. To prevent such attacks, configure the gateway in the following steps.
Enable source MAC address based ARP attack detection and specify the filter mode.
Set the threshold.
Set the age timer for detection entries.
Figure
127, the hosts access the Internet through a gateway (Device). If malicious users send
IP network
Host B
Use the command...
display arp anti-attack source-mac
{ slot slot-number | interface
interface-type interface-number } [ |
{ begin | exclude | include }
regular-expression ]
Gateway
Device
Host C
336
Remarks
Available in any
view
Server
0012-3f 86-e 94c
Host D

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

A3100-48 v2

Table of Contents