Anti-Ip Source Attacks; Anti-Arp Attacks - Zte ZXR10 ZSR V2 Series Product Description

Hide thumbs Also See for ZXR10 ZSR V2 Series:
Table of Contents

Advertisement

Support ACL bulk binding
3.7.2

Anti-IP source attacks

IP+MAC binding
The binding of MAC and IP addresses refers to the connections formed between
special IP addresses and MAC addresses according to the user's configuration. If
the message sent from this IP address does not match the designated MAC address,
it will be discarded to avoid attacks by fake IP addresses.
ARP scanning service
ARP scanning service triggers in-batch IP+MAC static binding tables.
IP Source Guard service
IPSG means the device working as a L2 device fights against IP source spoofing
attacks via the binding table.
3.7.3

Anti-ARP attacks

Send free ARP messages on a regular basis
Free ARP messages are sent to prevent the user's message from being blocked or
intercepted.
Anti-ARP spoofing-Strict ARP learning
Fight against the ARP spoofing via strict ARP learning.
Anti-ARP spoofing-ARP entity learning protection
ARP entity learning protection avoids the ARP spoofing.
Anti-ARP spoofing-Dynamic ARP inspection
Dynamic ARP inspection avoids the ARP spoofing.
Anti-ARP message flood-ARP message suppression
ARP message suppression avoids ARP message food.
ZTE Confidential & Proprietary
ZXR10 ZSR V2 Series Router Product Description
37

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents