369
Configuring ARP attack protection
The term "interface" in this chapter
collectively refers to VLAN interfaces and Layer 3 Ethernet interfaces.
You can set an Ethernet port as a Layer 3 interface by using the
port link-mode route
command (see
Layer 2
—
LAN Switching Configuration Guide
).
Overview
Although ARP is easy to implement, it provides no security mechanism and is vulnerable to network
attacks. An attacker can exploit ARP vulnerabilities to attack network devices in the following ways:
•
Acts as a trusted user or gateway to send ARP packets so the receiving devices obtain incorrect ARP
entries.
•
Sends a large number of destination unreachable IP packets to have the receiving device busy with
resolving destination IP addresses until its CPU is overloaded.
•
Sends a large number of ARP packets to overload the CPU of the receiving device.
For more information about ARP attack features and types, see
ARP Attack Protection Technology White
Paper
.
ARP attacks and viruses are threatening LAN security. This chapter introduces multiple features to detect
and prevent such attacks.
ARP attack protection configuration task list
Task Remarks
Flood prevention
Configuring ARP source
suppression
Optional.
Configure this function on
gateways (recommended).
Enabling ARP black hole routing
Optional.
Configure this function on
gateways (recommended).
Configuring ARP packet rate limit
Optional.
Configure this function on access
devices (recommended).
Configuring source MAC address based ARP
attack detection
Optional.
Configure this function on
gateways (recommended).
User and gateway
spoofing prevention
Configuring ARP packet source MAC address
consistency check
Optional.
Configure this function on
gateways (recommended).
Configuring ARP active acknowledgement
Optional.
Configure this function on
gateways (recommended).