Configuring Arp Attack Detection - H3C S3100 Series Operation Manual

H3c s3100 series ethernet switches operation manual
Hide thumbs Also See for S3100 Series:
Table of Contents

Advertisement

Operation
Configure the ARP aging timer
Enable the ARP entry checking
function (that is, disable the switch
from learning ARP entries with
multicast MAC addresses)
Static ARP entries are valid as long as the Ethernet switch operates normally. But some operations,
such as removing a VLAN, or removing a port from a VLAN, will make the corresponding ARP
entries invalid and therefore removed automatically.
As for the arp static command, the value of the vlan-id argument must be the ID of an existing
VLAN, and the port identified by the interface-type and interface-number arguments must belong to
the VLAN.
Currently, static ARP entries cannot be configured on the ports of an aggregation group.

Configuring ARP Attack Detection

Among the S3100 series Ethernet switches, only the S3100-EI series support ARP attack detection
function.
Table 1-5 Configure the ARP attack detection function
Operation
Enter system view
Enable DHCP snooping
Enter Ethernet port view
Specify the current port as a
trusted port
Quit to system view
Enter VLAN view
Command
arp timer aging aging-time
arp check enable
Command
system-view
dhcp-snooping
interface interface-type
interface-number
dhcp-snooping trust
quit
vlan vlan-id
1-6
Remarks
Optional
By default, the ARP aging
timer is set to 20 minutes.
Optional
By default, the ARP entry
checking function is
enabled.
Remarks
Required
By default, the DHCP snooping
function is disabled.
Required
By default, after DHCP snooping is
enabled, all ports of a switch are
untrusted ports.

Advertisement

Chapters

Table of Contents
loading

Table of Contents