1-4
To do…
Use the command…
Remarks
Configure ARP packet rate
limit
arp rate-limit
{
disable |
rate pps drop
}
Required
By default, the ARP packet rate limit
is enabled and is 100 pps.
Configuring Source MAC Address Based ARP Attack Detection
Introduction
This feature allows the device to check the source MAC address of ARP packets. If the number of ARP
packets sent from a MAC address within five seconds exceeds the specified value, the device
considers this an attack and adds the MAC address to the attack detection table. Before the attack
detection entry is aged out, the device generates an alarm and filters out ARP packets sourced from
that MAC address (in filter mode), or only generates an alarm (in monitor mode).
A gateway or critical server may send a large number of ARP packets. To prevent these ARP packets
from being discarded, you can specify the MAC address of the gateway or server as a protected MAC
address. A protected MAC address is excluded from ARP attack detection even if it is an attacker.
Only the ARP packets delivered to the CPU are detected.
Configuration Procedure
Follow these steps to configure source MAC address based ARP attack detection:
To do…
Use the command…
Remarks
Enter system view
system-view
—
Enable source MAC address
based ARP attack detection
and specify the detection mode
arp anti-attack source-mac
{
filter
|
monitor
}
Required
Disabled by default.
Configure the threshold
arp anti-attack source-mac
threshold threshold-value
Optional
50 by default.
Configure the aging timer for
source MAC address based
ARP attack detection entries
arp anti-attack source-mac
aging-time time
Optional
Five minutes by default.
Configure protected MAC
addresses
arp anti-attack source-mac
exclude-mac
mac-address
&<1-10>
Optional
Not configured by default.
After an ARP attack detection entry expires, the MAC address of the entry becomes ordinary.