HPE FlexNetwork 7500 Series Security Configuration Manual page 10

Table of Contents

Advertisement

Configuring ARP restricted forwarding ··································································································· 358
Enabling ARP detection logging ············································································································· 359
Displaying and maintaining ARP detection ···························································································· 359
User validity check configuration example ····························································································· 359
User validity check and ARP packet validity check configuration example ············································ 361
Configuring ARP scanning and fixed ARP ····································································································· 362
Configuration restrictions and guidelines ······························································································· 362
Configuration procedure ························································································································· 363
Configuring ARP gateway protection ············································································································· 363
Configuration guidelines ························································································································· 363
Configuration procedure ························································································································· 363
Configuration example ··························································································································· 364
Configuring ARP filtering ································································································································ 364
Configuration guidelines ························································································································· 364
Configuration procedure ························································································································· 365
Configuration example ··························································································································· 365
Configuring the checking of sender IP addresses for ARP packets ······························································ 366
Configuring uRPF ······················································································· 367
Overview ························································································································································ 367
uRPF check modes ································································································································ 367
Features ················································································································································· 367
uRPF operation ······································································································································ 368
Network application ································································································································ 369
Configuration procedure ································································································································ 370
Displaying and maintaining uRPF ·················································································································· 370
uRPF configuration example ·························································································································· 370
Configuring IPv6 uRPF ··············································································· 372
Overview ························································································································································ 372
IPv6 uRPF check modes ························································································································ 372
Features ················································································································································· 372
IPv6 uRPF operation ······························································································································ 373
Network application ································································································································ 374
Configuration procedure ································································································································ 375
Displaying and maintaining IPv6 uRPF ·········································································································· 375
IPv6 uRPF configuration example ················································································································· 375
Configuring FIPS ························································································· 377
Overview ························································································································································ 377
Configuration restrictions and guidelines ······································································································· 377
Configuring FIPS mode ·································································································································· 378
Entering FIPS mode ······························································································································· 378
Configuration changes in FIPS mode ···································································································· 379
Exiting FIPS mode ································································································································· 380
FIPS self-tests ················································································································································ 380
Power-up self-tests ································································································································ 381
Conditional self-tests ······························································································································ 381
Triggering self-tests ································································································································ 382
Displaying and maintaining FIPS ··················································································································· 382
FIPS configuration examples ························································································································· 382
Entering FIPS mode through automatic reboot ······················································································ 382
Entering FIPS mode through manual reboot ·························································································· 383
Exiting FIPS mode through automatic reboot ························································································ 385
Exiting FIPS mode through manual reboot ···························································································· 385
Configuring attack detection and prevention ··············································· 387
Overview ························································································································································ 387
Attacks that the device can prevent ··············································································································· 387
Single-packet attacks ····························································································································· 387
Scanning attacks ···································································································································· 388
Flood attacks ·········································································································································· 389
viii

Advertisement

Table of Contents
loading

Table of Contents