HP 12500 Series Configuration Manual page 9

Routing
Table of Contents

Advertisement

Authorized ARP configuration example (on a DHCP server) ·········································································· 270
Authorized ARP configuration example (on a DHCP relay agent) ································································ 272
Configuring ARP detection ·········································································································································· 273
Introduction ·························································································································································· 273
Enabling ARP detection based on static IP source guard binding entries/DHCP snooping entries/802.1x
security entries/OUI MAC addresses ··············································································································· 274
Configuring ARP detection based on specified objects ·················································································· 275
Configuring ARP restricted forwarding ············································································································· 276
Displaying and maintaining ARP detection ······································································································ 276
ARP detection configuration example 1············································································································ 276
ARP detection configuration example 2············································································································ 278
ARP restricted forwarding configuration example ··························································································· 279
Configuring ND attack defense ····························································································································· 282
Overview ······································································································································································· 282
Enabling source MAC consistency check for ND packets ······················································································· 283
Configuring the ND detection function ······················································································································ 283
Introduction to ND detection ······························································································································ 283
Configuration guidelines ···································································································································· 284
Configuration procedure ···································································································································· 284
Displaying and maintaining ND detection ······································································································· 284
ND detection configuration example ························································································································· 285
Network requirements ········································································································································· 285
Configuration procedure ···································································································································· 286
Configuring URPF ···················································································································································· 288
Overview ······································································································································································· 288
URPF check modes ·············································································································································· 288
URPF link layer check ·········································································································································· 288
How URPF works ················································································································································· 288
Configuring URPF ························································································································································· 289
URPF configuration example ······································································································································· 289
Configuring PKI ······················································································································································· 291
Overview ······································································································································································· 291
PKI terms ······························································································································································· 291
PKI architecture ···················································································································································· 292
PKI operation ······················································································································································· 293
PKI applications ··················································································································································· 293
PKI configuration task list ············································································································································ 293
Configuring an entity DN ············································································································································ 294
Configuring a PKI domain ··········································································································································· 295
Submitting a PKI certificate request ···························································································································· 296
Submitting a certificate request in auto mode ·································································································· 297
Submitting a certificate request in manual mode ····························································································· 297
Retrieving a certificate manually ································································································································ 298
Configuration guidelines ···································································································································· 298
Configuration procedure ···································································································································· 298
Configuring PKI certificate verification ······················································································································ 299
Configuring PKI certificate verification with CRL checking ············································································· 299
Configuring PKI certificate verification without CRL checking ········································································ 300
Destroying a local RSA or ECDSA key pair ·············································································································· 300
Deleting a certificate ···················································································································································· 300
Configuring an access control policy ························································································································ 301
Displaying and maintaining PKI ································································································································· 301
PKI configuration examples ········································································································································· 302
vii
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Advertisement

Table of Contents
loading

Table of Contents