9
Parameters
mac-address
&<1-10>
: Specifies a MAC address list. The
mac-address
argument indicates an
excluded MAC address in the format of H-H-H.
&<1-10>
indicates that you can specify a maximum
of 10 excluded MAC addresses each time.
Usage guidelines
If you do not specify a MAC address, the
undo arp source-mac exclude-mac
command
removes all excluded MAC addresses.
You can repeat this command to configure a maximum of 64 MAC addresses excluded from source
MAC-based ARP attack detection.
Examples
# Exclude a MAC address from source MAC-based ARP attack detection.
<Sysname> system-view
[Sysname] arp source-mac exclude-mac 001e-1200-0213
arp source-mac log enable
Use
arp source-mac log enable
to enable logging for source MAC-based ARP attack
detection.
Use
undo arp source-mac log enable
to disable logging for source MAC-based ARP attack
detection.
Syntax
arp source-mac log enable
undo arp source-mac log enable
Default
Logging for source MAC-based ARP attack detection is disabled.
Views
System view
Predefined user roles
network-admin
Usage guidelines
When the device detects a source MAC-based ARP attack, it generates a log message and sends it
to the information center. For information about the log destination and output rule configuration in
the information center, see
Network Management and Monitoring Configuration Guide
.
The log messages help administrators to locate and solve problems.
Examples
# Enable logging for source MAC-based ARP attack detection.
<Sysname> system-view
[Sysname] arp source-mac log enable
arp source-mac threshold
Use
arp source-mac threshold
to set the threshold for source MAC-based ARP attack
detection. If the number of ARP packets sent from a MAC address within 5 seconds exceeds this
threshold, the device recognizes this as an attack.
Summary of Contents for SOHO IE4300
Page 285: ...i Contents Tcl commands 1 cli 1 tclquit 1 tclsh 2...
Page 288: ...i Contents Python commands 1 exit 1 python 1 python filename 2...
Page 291: ...i Contents Automatic configuration commands 1 autodeploy udisk enable 1...
Page 323: ...25 Sysname Ten GigabitEthernet1 0 51 undo shutdown Related commands irf port...
Page 465: ...ii stp vlan enable 55 vlan mapping modulo 55...
Page 602: ...12 Related commands display mvrp statistics...
Page 609: ...i Contents VLAN mapping commands 1 display vlan mapping 1 vlan mapping 2...
Page 678: ...9 Related commands reset pppoe relay statistics...
Page 846: ...i Contents Basic IP forwarding commands 1 display fib 1 ip forwarding table save 2...
Page 1770: ...i Contents Time range commands 1 display time range 1 time range 1...
Page 2026: ...34 Related commands display mac authentication...
Page 2028: ...ii...
Page 2143: ...i Contents User profile commands 1 display user profile 1 user profile 2...
Page 2308: ...61 ipsec transform set...
Page 2531: ...i Contents SAVI commands 1 ipv6 savi down delay 1 ipv6 savi log enable 1 ipv6 savi strict 2...
Page 2534: ...3 Sysname ipv6 savi strict Related commands ipv6 verify source...
Page 2791: ...14 Sysname track 1 Related commands delay display track...
Page 2939: ...9 sntp authentication keyid sntp reliable authentication keyid...
Page 2967: ...27 Related commands apply poe profile poe enable poe max power interface view poe priority...