
296
Parameters
threshold-value
: Threshold for source MAC address based ARP attack detection, in the range 10 to 100.
Description
Use the
arp anti-attack source-mac threshold
command to configure the threshold for source MAC
address based ARP attack detection. If the number of ARP packets sent from a MAC address within five
seconds exceeds this threshold, the switch considers this an attack.
Use the
undo arp anti-attack source-mac threshold
command to restore the default.
By default, the threshold for source MAC address based ARP attack detection is 50.
Examples
# Configure the threshold for source MAC address based ARP attack detection as 30.
<Sysname> system-view
[Sysname] arp anti-attack source-mac threshold 30
display arp anti-attack source-mac
Syntax
display arp anti-attack source-mac
{
slot
slot-number
|
interface
interface-type interface-number
} [
|
{
begin
|
exclude
|
include
}
regular-expression
]
View
Any view
Default level
1: Monitor level
Parameters
interface
interface-type interface-number
: Displays attacking MAC addresses detected on the interface.
slot
slot-number
: Displays attacking MAC addresses detected on the specified device. If the device is in
an IRF, the
slot-number
argument represents the member ID of the device; if the device is not in any IRF,
the
slot-number
argument represents the device ID.
|
: Filters command output by specifying a regular expression. For more information about regular
expressions, see the
Fundamentals Configuration Guide
.
begin
: Displays the first line that matches the specified regular expression and all lines that follow.
exclude
: Displays all lines that do not match the specified regular expression.
include
: Displays all lines that match the specified regular expression.
regular-expression
: Specifies a regular expression, which is a case sensitive string of 1 to 256 characters.
Description
Use the
display arp anti-attack source-mac
command to display attacking MAC addresses detected by
source MAC address based ARP attack detection.
Examples
# Display the attacking MAC addresses detected by source MAC address based ARP attack detection.
<Sysname> display arp anti-attack source-mac slot 1
Source-MAC VLAN ID Interface Aging-time
23f3-1122-3344 4094 GE1/0/1 10