Configuring Arp Attack Defense; Arp Attack Defense Configuration Task List - 3Com 5500-EI PWR Install Manual

Hide thumbs Also See for 5500-EI PWR:
Table of Contents

Advertisement

Figure 2-2 Gateway spoofing attack
To prevent gateway spoofing attacks, an S5500-EI series Ethernet switch can work as an access device
(usually with the upstream port connected to the gateway and the downstream ports connected to hosts)
and filter ARP packets based on the gateway's address.
To filter APR attack packets arriving on a downstream port, you can bind the gateway's IP address
to the downstream port (directly connected to hosts) of the switch. After that, the port will discard
ARP packets with the gateway's IP address as the sender IP address, and permit other ARP
packets to pass.
To filter ARP attack packets arriving on the upstream port, you can bind the IP and MAC addresses
of the gateway to the cascaded port or upstream port of the access switch. After that, the port will
discard ARP packets with the sender IP address as the gateway's IP address but with the sender
MAC address different from the gateway's MAC address, and permit other ARP packets to pass.
An ARP trusted port has higher priority comparing with support for ARP packet filtering based on
gateway's address. That is, if you configure a cascaded port or an upstream port as an ARP trusted port,
the gateway's IP and MAC addresses configured on the port are ineffective.

Configuring ARP Attack Defense

ARP Attack Defense Configuration Task List

Complete the following tasks to configure ARP attack defense:
2-4

Advertisement

Table of Contents
loading

This manual is also suitable for:

5500-ei series

Table of Contents