Egress Max
(kbps)
Click Save and click Apply , then click Save .
4.9
We can effectively prevent ARP attack and IP embezzlement by enabling the IP&MAC
binding. Within the local network, the device transmits IP packets to the certain target
identified by the MAC address. Therefore, the IP and MAC address should be one-to-
one correspondence and their corresponding relations are maintained by the ARP
table. ARP attack can use forged information to renewal the ARP table, and destroy
the corresponding relations between IP and MAC addresses, which would prevent the
communication between the device and the corresponding host. When the IP&MAC
Binding function is enabled, the IP and MAC relations in the ARP table won't be expired and
renewed automatically, which effectively prevents the ARP attack.
Some functions such as access control and bandwidth control, are based on the IP
addresses to identify the access clients. The network administrator can allocate every
client a static IP, according to which he makes the access and bandwidth rules to control
the clients' online behavior and the bandwidth they've used. Some illegal users may
change the IP address in order to get higher internet access. Enabling IP & MAC binding
function can effectively prevent the IP embezzlement.
Note:
After IP & MAC binding function is enabled, the IP bound to the MAC cannot be used by other MACs.
However this MAC can use other IPs within the same segment, which are not bounded by other
MACs, to access the network.
Go to the
address and MAC address.
Tips:
Click Import to quick import the entries in ARP table to IP & MAC Binding table. The imported
entries are disabled by default. Select the desired entries and click Edit to enable it.
Specify the maximum egress bandwidth for the desired entry.
page. In the
84
section, click Add and specify the IP
Need help?
Do you have a question about the Pharos Series and is the answer not in the manual?