H3C LS-5100-16P-SI-OVS-H3 Configuration page 283

Low-end ethernet switches
Table of Contents

Advertisement

H3C Low-End Ethernet Switches Configuration Examples
ARP Attack Prevention
Chapter 1 ARP Attack Prevention Overview .............................................................................. 1-1
1.1 Introduction to ARP Attacks............................................................................................... 1-1
1.2 ARP Attack Prevention ...................................................................................................... 1-4
1.2.1 DHCP Snooping Function ....................................................................................... 1-4
1.2.2 IP Static Binding ...................................................................................................... 1-5
1.2.3 ARP Attack Detection.............................................................................................. 1-5
1.2.4 ARP Packet Rate Limit............................................................................................ 1-6
1.2.5 Attack Prevention with the Support of a CAMS Server........................................... 1-6
1.3 Configuring ARP Attack Prevention................................................................................... 1-7
1.4 Device Models that Supports ARP Attack Prevention ....................................................... 1-8
Chapter 2 Configuration Examples ............................................................................................. 2-1
2.1.1 Network Requirements............................................................................................ 2-1
2.1.2 Network Diagram..................................................................................................... 2-2
2.1.5 Configuration Guidelines......................................................................................... 2-6
2.2.1 Network Requirements............................................................................................ 2-7
2.2.2 Network Diagram..................................................................................................... 2-8
2.2.3 Configuration Considerations.................................................................................. 2-8
2.2.4 Configuration Procedures ....................................................................................... 2-8
2.2.5 Configuration Guidelines....................................................................................... 2-20
Table of Contents
i
Table of Contents

Advertisement

Table of Contents
loading

Table of Contents