Arp Attack Detection And Packet Rate Limit Configuration Example - H3C S3100 8C SI Operation Manual

S3100 series ethernet switches
Table of Contents

Advertisement

Operation Manual – ARP
H3C S3100 Series Ethernet Switches

1.5.2 ARP Attack Detection and Packet Rate Limit Configuration Example

I. Network requirements
As shown in
Server; Ethernet1/0/2 connects to Client A, Ethernet1/0/3 connects to Client B.
Ethernet1/0/1, Ethernet1/0/2 and Ethernet1/0/3 belong to VLAN 1.
Enable DHCP snooping on Switch A and specify Ethernet1/0/1 as the DHCP
snooping trusted port.
Enable ARP attack detection in VLAN 1 to prevent ARP man-in-the-middle attacks,
and specify Ethernet1/0/1 as the ARP trusted port.
Enable the ARP packet rate limit function on Ethernet1/0/2 and Ethernet1/0/3 of
Switch A, so as to prevent Client A and Client B from attacking Switch A through
ARP traffic.
Enable the port state auto recovery function on the ports of Switch A, and set the
recovery interval to 200 seconds.
II. Network diagram
Figure 1-4 ARP attack detection and packet rate limit configuration
III. Configuration procedure
# Enable DHCP snooping on Switch A.
<SwitchA> system-view
[SwitchA] dhcp-snooping
# Specify Ethernet1/0/1 as the DHCP snooping trusted port and the ARP trusted port.
[SwitchA] interface Ethernet1/0/1
[SwitchA-Ethernet1/0/1] dhcp-snooping trust
[SwitchA-Ethernet1/0/1] arp detection trust
[SwitchA-Ethernet1/0/1] quit
Figure
1-4, Ethernet1/0/1 of Switch A (S3100-EI) connects to DHCP
1-13
Chapter 1 ARP Configuration

Advertisement

Table of Contents
loading

This manual is also suitable for:

S3100-si seriesS3100-ei series

Table of Contents