H3C LS-3100-52P-OVS-H3 Operation Manual page 335

S5500-ei series ethernet switches
Table of Contents

Advertisement

1 ARP Configuration·····································································································································1-1
ARP Overview·········································································································································1-1
ARP Function ··································································································································1-1
ARP Message Format ·····················································································································1-1
ARP Address Resolution Process···································································································1-2
ARP Table ·······································································································································1-3
Configuring ARP ·····································································································································1-3
Configuring a Static ARP Entry ·······································································································1-3
Configuring the Maximum Number of ARP Entries for a VLAN Interface ·······································1-4
Setting the Aging Time for Dynamic ARP Entries ···········································································1-4
Enabling the ARP Entry Check ·······································································································1-5
Configuring Gratuitous ARP····················································································································1-5
Introduction to Gratuitous ARP········································································································1-5
Configuring Gratuitous ARP ············································································································1-6
Displaying and Maintaining ARP·············································································································1-6
2 Proxy ARP Configuration ·························································································································2-1
Proxy ARP Overview·······························································································································2-1
Proxy ARP ·······································································································································2-1
Local Proxy ARP ·····························································································································2-2
Enabling Proxy ARP································································································································2-2
Displaying and Maintaining Proxy ARP ··································································································2-3
Proxy ARP Configuration Examples ·······································································································2-3
Proxy ARP Configuration Example ·································································································2-3
Local Proxy ARP Configuration Example in Case of Port Isolation ················································2-4
Local Proxy ARP Configuration Example in Isolate-user-vlan ························································2-5
3 ARP Attack Defense Configuration ·········································································································3-1
Configuring ARP Source Suppression····································································································3-1
Introduction to ARP Source Suppression························································································3-1
Configuring ARP Source Suppression ····························································································3-1
Displaying and Maintaining ARP Source Suppression ···································································3-2
Configuring ARP Defense Against IP Packet Attacks ············································································3-2
Introduction to ARP Defense Against IP Packet Attacks ································································3-2
Enabling ARP Defense Against IP Packet Attacks ·········································································3-2
Configuring ARP Active Acknowledgement ····························································································3-2
Introduction······································································································································3-2
Configuring the ARP Active Acknowledgement Function ·······························································3-3
Configuring Source MAC Address Based ARP Attack Detection···························································3-3
Introduction······································································································································3-3
Configuration Procedure··················································································································3-3
Displaying and Maintaining Source MAC Address Based ARP Attack Detection···························3-4
Configuring ARP Packet Source MAC Address Consistency Check ·····················································3-4
Introduction······································································································································3-4
Table of Contents
i

Advertisement

Chapters

Table of Contents
loading

Table of Contents