Configuring Arp Attack Detection - 3Com 5500-EI PWR Install Manual

Hide thumbs Also See for 5500-EI PWR:
Table of Contents

Advertisement

To do...
Enter Ethernet port view
Configure ARP packet filtering
based on the gateway's IP
address
Follow these steps to configure ARP packet filtering based on gateway's IP and MAC address:
To do...
Enter system view
Enter Ethernet port view
Configure ARP packet filtering
based on the gateway's IP and
MAC addresses
The arp filter source and arp filter binding commands are mutually exclusive on an Ethernet port.
That is, you can only configure ARP packet filtering based on gateway's IP address, or based on
gateway's IP and MAC addresses on an Ethernet port. Generally, ARP packet filtering based on
gateway's IP address is configured on the switch's port directly connected to a host, and ARP packet
filtering based on gateway's IP and MAC addresses is configured on the cascaded port or upstream
port.

Configuring ARP Attack Detection

Follow these steps to configure the ARP attack detection function:
To do...
Enter system view
Create a static binding
Enable DHCP snooping
Enable ARP attack detection
based on IP-to-MAC bindings
of authenticated 802.1x clients
Enter Ethernet port view
Use the command...
interface interface-type
interface-number
arp filter source ip-address
Use the command...
system-view
interface interface-type
interface-number
arp filter binding ip-address
mac-address
Use the command...
system-view
ip source static binding
ip-address ip-address
[ mac-address mac-address ]
dhcp-snooping
ip source static import dot1x
interface interface-type
interface-number
2-6
Remarks
Required
Not configured by default.
Remarks
Required
Not configured by default.
Remarks
Required
Use at least one of the
commands.
By default, no IP static binding
is created, and the DHCP
snooping function and ARP
attack detection based on
authenticated 802.1x clients
are disabled.

Advertisement

Table of Contents
loading

This manual is also suitable for:

5500-ei series

Table of Contents