i
Table of Contents
1 ARP and IP Attack Defense Configuration ································································································ 1
ARP Packet Filtering Based on Gateway’s Address ················································································· 1
Introduction········································································································································· 1
Configuring ARP Packet Filtering······································································································· 1
Configuring the Maximum Number of Dynamic ARP Entries a VLAN Interface Can Learn······················ 2
Introduction········································································································································· 2
Configuring the Maximum Number of Dynamic ARP Entries that a VLAN Interface Can Learn ······· 2
ARP/IP Attack Defense Based on 802.1x·································································································· 3
Overview············································································································································· 3
Configuring 802.1x-Based ARP/IP Attack Defense ··········································································· 3
Configuring ARP Source MAC Address Consistency Check····································································· 4
Introduction········································································································································· 4
Enabling ARP Source MAC Address Consistency Check ································································· 5
ARP Attack Defense Configuration Example I··························································································· 5
Network Requirements ······················································································································· 5
Network Diagram································································································································ 5
Configuration Procedures··················································································································· 5
ARP Attack Defense Configuration Example II·························································································· 6
Network Requirements ······················································································································· 6
Network Diagram································································································································ 6
Configuration Procedures··················································································································· 6
ARP/IP Attack Defense Configuration Example III ···················································································· 7
Network Requirements ······················································································································· 7
Network Diagram································································································································ 7
Configuration Procedures··················································································································· 7
Summary of Contents for S3100 Series
Page 74: ...7 7 Sysname ip http acl 2030...
Page 270: ...1 51 Sysname GigabitEthernet1 0 1 port trunk permit vlan all...
Page 579: ...ii Configuration Example 2 4 QoS Profile Configuration Example 2 4...
Page 713: ...1 22 Total associations 1...
Page 823: ...1 16...
Page 1054: ...i Table of Contents Appendix A Acronyms A 1...