Configuring Arp Attack Defense; Arp Attack Defense Configuration Task List - 3Com E4500-24 Cli Configuration Manual

Hp e4500-24: user guide
Table of Contents

Advertisement

Figure 2-2 Gateway spoofing attack
To prevent gateway spoofing attacks, an S4500 series Ethernet switch can work as an access device
(usually with the upstream port connected to the gateway and the downstream ports connected to hosts)
and filter ARP packets based on the gateway's address.
To filter APR attack packets arriving on a downstream port, you can bind the gateway's IP address
to the downstream port (directly connected to hosts) of the switch. After that, the port will discard
ARP packets with the gateway's IP address as the sender IP address, and permit other ARP
packets to pass.
To filter ARP attack packets arriving on the upstream port, you can bind the IP and MAC addresses
of the gateway to the cascaded port or upstream port of the access switch. After that, the port will
discard ARP packets with the sender IP address as the gateway's IP address but with the sender
MAC address different from the gateway's MAC address, and permit other ARP packets to pass.
An ARP trusted port has higher priority comparing with support for ARP packet filtering based on
gateway's address. That is, if you configure a cascaded port or an upstream port as an ARP trusted port,
the gateway's IP and MAC addresses configured on the port are ineffective.

Configuring ARP Attack Defense

ARP Attack Defense Configuration Task List

Complete the following tasks to configure ARP attack defense:
2-4

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

4500

Table of Contents