Displaying And Maintaining Source Mac Address Based Arp Attack Detection; Configuration Example - HP 3600 v2 Series Configuration Manual

Hide thumbs Also See for 3600 v2 Series:
Table of Contents

Advertisement

Displaying and maintaining source MAC address based ARP
attack detection
Task
Display attacking MAC addresses
detected by source MAC address based
ARP attack detection.

Configuration example

Network requirements
As shown in
a large number of ARP requests to the gateway, the gateway may crash and cannot process requests
from the clients. To solve this problem, configure source MAC address based ARP attack detection on the
gateway.
Figure 117 Network diagram
ARP attack protection
Host A
Configuration considerations
An attacker may forge a large number of ARP packets by using the MAC address of a valid host as the
source MAC address. To prevent such attacks, configure the gateway in the following steps:
1.
Enable source MAC address based ARP attack detection and specify the filter mode.
2.
Set the threshold.
3.
Set the age timer for detection entries.
Figure 1
17, the hosts access the Internet through a gateway (Device). If malicious users send
IP network
Host B
Command
display arp anti-attack source-mac { slot
slot-number | interface interface-type
interface-number } [ | { begin | exclude |
include } regular-expression ]
Gateway
Device
Host C
378
Remarks
Available in any view
Server
0012-3f 86-e 94c
Host D

Advertisement

Table of Contents
loading

Table of Contents