HP 6125G Configuration Manual page 9

Security configuration guide
Hide thumbs Also See for 6125G:
Table of Contents

Advertisement

Introduction ·························································································································································· 240
Configuration procedure ···································································································································· 240
Configuring ARP active acknowledgement ··············································································································· 240
Introduction ·························································································································································· 240
Configuration procedure ···································································································································· 240
Configuring ARP detection ·········································································································································· 241
Introduction ·························································································································································· 241
Configuring user validity check ························································································································· 241
Configuring ARP packet validity check ············································································································· 242
Configuring ARP restricted forwarding ············································································································· 243
Displaying and maintaining ARP detection ······································································································ 243
User validity check configuration example ······································································································· 244
User validity check and ARP packet validity check configuration example ·················································· 245
ARP restricted forwarding configuration example ··························································································· 246
Configuring ARP automatic scanning and fixed ARP ······························································································· 248
Configuration guidelines ···································································································································· 248
Configuration procedure ···································································································································· 249
Configuring ARP gateway protection ························································································································ 249
Configuration guidelines ···································································································································· 249
Configuration procedure ···································································································································· 249
Configuration example ······································································································································· 250
Configuring ARP filtering ············································································································································· 250
Configuration guidelines ···································································································································· 251
Configuration procedure ···································································································································· 251
Configuration example ······································································································································· 251
Configuring ND attack defense ····························································································································· 253
Overview ······································································································································································· 253
Enabling source MAC consistency check for ND packets ······················································································· 254
Configuring URPF ···················································································································································· 255
Overview ······································································································································································· 255
How URPF works ·························································································································································· 255
Configuring URPF ························································································································································· 257
URPF configuration example ······································································································································· 257
Configuring MFF ····················································································································································· 259
Overview ······································································································································································· 259
Basic concepts ····················································································································································· 260
Operation modes ················································································································································ 260
Working mechanism ··········································································································································· 261
Protocols and standards ····································································································································· 261
Configuring MFF ·························································································································································· 261
Configuration prerequisites ································································································································ 261
Enabling MFF ······················································································································································· 262
Configuring a network port ································································································································ 262
Enabling periodic gateway probe ···················································································································· 262
Specifying the IP addresses of servers ·············································································································· 262
Displaying and maintaining MFF ······························································································································· 263
MFF configuration examples ······································································································································· 263
Auto-mode MFF configuration example in a tree network ·············································································· 263
Auto-mode MFF configuration example in a ring network ············································································· 265
Manual-mode MFF configuration example in a tree network ········································································· 267
Manual-mode MFF configuration example in a ring network ········································································ 268
vii
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Advertisement

Table of Contents
loading

This manual is also suitable for:

6125 blade switch series

Table of Contents