Configuring Arp Detection - HPE Moonshot 45Gc Security Configuration Manual

Switch module
Table of Contents

Advertisement

[SwitchB-FortyGigE1/1/1] quit
[SwitchB] interface fortygige 1/1/2
[SwitchB-FortyGigE1/1/2] port link-mode route
[SwitchB-FortyGigE1/1/2] ip address 10.10.1.1 24
# Enable DHCP relay agent on FortyGigE 1/1/2.
[SwitchB-FortyGigE1/1/2] dhcp select relay
# Add the DHCP server 10.1.1.1 to DHCP server group 1.
[SwitchB-FortyGigE1/1/2] dhcp relay server-address 10.1.1.1
# Enable authorized ARP.
[SwitchB-FortyGigE1/1/2] arp authorized enable
[SwitchB-FortyGigE1/1/2] quit
# Enable recording of relay entries on the relay agent.
[SwitchB] dhcp relay client-information record
3.
Configure Switch C:
<SwitchC> system-view
[SwitchC] ip route-static 10.1.1.0 24 10.10.1.1
[SwitchC] interface fortygige 1/1/2
[SwitchC-FortyGigE1/1/2] port link-mode route
[SwitchC-FortyGigE1/1/2] ip address dhcp-alloc
[SwitchC-FortyGigE1/1/2] quit
Verifying the configuration
# Display authorized ARP information on Switch B.
[SwitchB] display arp all
Type: S-Static
IP Address
10.10.1.2
The output shows that Switch A assigned the IP address 10.10.1.2 to Switch C.
Switch C must use the IP address and MAC address in the authorized ARP entry to communicate
with Switch B. Otherwise, the communication fails. Thus the user validity is ensured.

Configuring ARP detection

ARP detection enables access devices to block ARP packets from unauthorized clients to prevent
user spoofing and gateway spoofing attacks. ARP detection does not check ARP packets received
from ARP trusted ports.
ARP detection provides the following features:
User validity check.
ARP packet validity check.
ARP restricted forwarding.
ARP detection logging.
If both ARP packet validity check and user validity check are enabled, the former one applies first,
and then the latter applies.
D-Dynamic
O-Openflow
MAC Address
VLAN
0012-3f86-e94c
N/A
M-Multiport
Interface
FGE1/1/2
411
I-Invalid
Aging Type
20
D

Advertisement

Table of Contents
loading

Table of Contents