269
To do…
Use the command…
Remarks
Enter system view
system-view
—
Enable source MAC address
based ARP attack detection and
specify the detection mode
arp anti-attack source-mac
{
filter
|
monitor
}
Required
Disabled by default.
Configure the threshold
arp anti-attack source-mac
threshold
threshold-value
Optional
50 by default.
Configure the age timer for ARP
attack detection entries
arp anti-attack source-mac aging-
time
time
Optional
300 seconds by default.
Configure protected MAC
addresses
arp anti-attack source-mac
exclude-mac
mac-address
&<1-
10>
Optional
No protected MAC address is
configured by default.
NOTE:
After an ARP attack detection entry expires, ARP packets sourced from the MAC address in the entry
can be processed normally.
Displaying and maintaining source MAC address based ARP
attack detection
To do…
Use the command…
Remarks
Display attacking MAC addresses detected
by source MAC address based ARP attack
detection
display arp anti-attack source-mac
{
slot
slot-number
|
interface
interface-
type
interface-number
} [
|
{
begin
|
exclude
|
include
}
regular-
expression
]
Available in any
view
Configuring ARP packet source MAC address
consistency check
Introduction
This feature enables a gateway device to filter out ARP packets with a source MAC address in the
Ethernet header different from the sender MAC address in the message body, so that the gateway device
can learn correct ARP entries.
Configuration procedure
Follow these steps to enable ARP packet source MAC address consistency check:
To do…
Use the command…
Remarks
Enter system view
system-view
—