Introduction This document provides configuration examples of link layer attack protection, ARP attack protection, network layer attack protection, and transport layer attack protection, as defined in Table Table 1 Attack protection types Attack protection types Description Prevents the attack of packets with different source MAC address attack MAC addresses or VLANs by configuring the protection...
Example: Configuring link layer attack protection Network requirements As shown in Figure 1, Device A, Device B, and Device C run MSTP. Device B acts as the root bridge, and GigabitEthernet 2/0/1 on Device C is blocked. Configure the following features to prevent link layer attacks: •...
Figure 1 Network diagram Requirements analysis For the ports at the access side of Device A and Device C to rapidly transit to the forwarding state, use the stp edged-port command to configure these ports as edge ports. This example uses GigabitEthernet 2/0/3 to illustrate the configuration on the ports at the access side on Device A and Device C.
Software version used This example was created and verified on S7500EX-CMW710-R7168. Configuration procedures # Specify IP addresses for interfaces. (Details not shown.) # Enable ARP source suppression. <Device> system-view [Device] arp source-suppression enable # Configure the device to accept a maximum of 8 unresolvable packets per source IP address in 5 seconds.
Configuration files arp valid-check enable arp source-mac filter arp source-mac threshold 25 arp active-ack enable arp source-suppression enable arp source-suppression limit 8 Example: Configuring network layer attack protection Network requirements As shown in Figure 3, Device A is the gateway for the internal network. To protect Device A against IP packet attacks from internal and external networks, configure the following network layer attack protection features: Configure strict uRPF check to prevent source address spoofing attacks.
# Disable sending ICMP time exceeded messages. Sending ICMP time exceeded messages is disabled by default. [DeviceA] undo ip ttl-expires enable Verifying the configuration Verify that Device A can prevent source address spoofing attacks: # Verify that Device A can filter out packets with forged source IP addresses. (Details not shown.) # Verify the uRPF configuration.
responds to a SYN packet with a SYN ACK packet without establishing a TCP semi-connection. The device establishes a TCP connection only when it receives an ACK packet from the sender. Figure 4 Network diagram Software version used This example was created and verified on S7500EX-CMW710-R7168. Configuration procedures # Specify IP addresses for interfaces.
Need help?
Do you have a question about the S7500E-X and is the answer not in the manual?
Questions and answers