Configuring Arp Attack Protection; Overview; Arp Attack Protection Configuration Task List - HP 6600 Security Configuration Manual

Table of Contents

Advertisement

Configuring ARP attack protection

ARP attacks and viruses threaten LAN security. This chapter describes multiple features used to detect and
prevent such attacks.

Overview

Although ARP is easy to implement, it provides no security mechanism and is vulnerable to network
attacks. An attacker can exploit ARP vulnerabilities to attack network devices in the following ways:
Acts as a trusted user or gateway to send ARP packets so the receiving devices obtain incorrect ARP
entries.
Sends a large number of unresolvable IP packets (ARP cannot find MAC addresses for those
packets) to keep the receiving device busy with resolving destination IP addresses until the CPU is
overloaded.
Sends a large number of ARP packets to overload the CPU of the receiving device.
For more information about ARP attack features and types, see ARP Attack Protection Technology White
Paper.

ARP attack protection configuration task list

Task
Flood
prevention
User and
gateway
spoofing
prevention
Configuring ARP
Configuring
source
unresolvable
suppression
IP attack
Enabling ARP
protection
black hole routing
Configuring ARP packet rate limit
Configuring ARP active
acknowledgement
Configuring authorized ARP
Configuring ARP detection
Configuring ARP automatic
scanning and fixed ARP
Remarks
Optional.
Configure this function on gateways (recommended).
Optional.
Configure this function on gateways (recommended).
Optional.
Configure this function on access devices
(recommended).
Optional.
Configure this function on gateways (recommended).
Optional.
Configure this function on gateways (recommended).
Optional.
Configure this function on access devices
(recommended).
Optional.
Configure this function on gateways (recommended).
508

Advertisement

Table of Contents
loading

This manual is also suitable for:

Hsr6600

Table of Contents