Configuring Advanced Threat Protection
Dynamic ARP Protection
■
Verifies IP-to-MAC address bindings on untrusted ports with the informa
tion stored in the lease database maintained by DHCP snooping and user-
configured static bindings (in non-DHCP environments):
•
If a binding is valid, the switch updates its local ARP cache and
forwards the packet.
•
If a binding is invalid, the switch drops the packet, preventing other
network devices from receiving the invalid IP-to-MAC information.
DHCP snooping intercepts and examines DHCP packets received on
switch ports before forwarding the packets. DHCP packets are checked
against a database of DHCP binding information. Each binding consists
of a client MAC address, port number, VLAN identifier, leased IP address,
and lease time. The DHCP binding database is used to validate packets by
other security features on the switch. For more information, refer to
“DHCP Snooping” in the
Access Security Guide
.
If you have already enabled DHCP snooping on a switch, you may also
want to add static IP-to-MAC address bindings to the DHCP snooping
database so that ARP packets from devices that have been assigned static
IP addresses are also verified.
■
Supports additional checks to verify source MAC address, destination
MAC address, and IP address.
ARP packets that contain invalid IP addresses or MAC addresses in their
body that do not match the addresses in the Ethernet header are dropped.
When dynamic ARP protection is enabled, only ARP request and reply packets
with valid IP-to-MAC address bindings in their packet header are relayed and
used to update the ARP cache.
Dynamic ARP protection is implemented in the following ways on a switch:
■
You can configure dynamic ARP protection only from the CLI; you cannot
configure this feature from the web or menu interfaces.
■
Line rate—Dynamic ARP protection copies ARP packets to the switch
CPU, evaluates the packets, and then re-forwards them through the switch
software. During this process, if ARP packets are received at too high a
line rate, some ARP packets may be dropped and will need to be retrans
mitted.
■
The SNMP MIB, HP-ICF-ARP-PROTECT-MIB, is created to configure
dynamic ARP protection and to report ARP packet-forwarding status and
counters.
10-16
Summary of Contents for PROCURVE 2910AL
Page 1: ...Access Security Guide ProCurve Switches W 14 03 2910al www procurve com ...
Page 2: ......
Page 3: ...HP ProCurve 2910al Switch February 2009 W 14 03 Access Security Guide ...
Page 84: ...Configuring Username and Password Security Front Panel Security 2 36 ...
Page 156: ...TACACS Authentication Operating Notes 4 30 ...
Page 288: ...Configuring Secure Socket Layer SSL Common Errors in SSL setup 8 22 ...
Page 416: ...Configuring Advanced Threat Protection Using the Instrumentation Monitor 10 28 ...
Page 572: ...Using Authorized IP Managers Operating Notes 14 14 ...
Page 592: ...12 Index ...
Page 593: ......