1-1
1
ARP Attack Protection Configuration
When configuring ARP attack Protection, go to these sections for information you are interested in:
z
Configuring ARP Defense Against IP Packet Attacks
z
Configuring ARP Active Acknowledgement
z
Configuring Source MAC Address Based ARP Attack Detection
z
Configuring ARP Packet Rate Limit
z
Configuring ARP Detection
ARP Attack Protection Overview
Although ARP is easy to implement, it provides no security mechanism and thus is prone to network
attacks. An attacker can send
z
ARP packets by acting as a trusted user or gateway. As a result, the receiving device obtains
incorrect ARP entries, and thus a communication failure occurs.
z
A large number of IP packets with unreachable destinations. As a result, the receiving device
continuously resolves destination IP addresses and thus its CPU is overloaded.
z
A large number of ARP packets to bring a great impact to the CPU.
For details about ARP attack features and types, refer to
ARP Attack Protection Technology White
Paper
.
Currently, ARP attacks and viruses are threatening LAN security. The device can provide multiple
features to detect and prevent such attacks. This chapter mainly introduces these features.
ARP Attack Protection Configuration Task List
Complete the following tasks to configure ARP attack Protection:
Task
Remarks
Configuring ARP
Source Suppression
Optional
Configure this function on gateways (recommended).
Flood prevention
Enabling ARP Black
Hole Routing
Optional
Configure this function on gateways (recommended).
Configuring ARP Active Acknowledgement
Optional
Configure this function on gateways (recommended).
Configuring Source MAC Address Based
ARP Attack Detection
Optional
Configure this function on gateways (recommended).
Configuring ARP Packet Rate Limit
Optional
Configure this function on gateways (recommended).
Configuring ARP Detection
Optional
Configure this function on gateways and access
devices (recommended).
Содержание S7906E - Switch
Страница 82: ...1 4 DeviceA interface tunnel 1 DeviceA Tunnel1 service loopback group 1...
Страница 200: ...1 11 DeviceB display vlan dynamic No dynamic vlans exist...
Страница 494: ...ii Displaying and Maintaining Tunneling Configuration 1 45 Troubleshooting Tunneling Configuration 1 45...
Страница 598: ...ii...
Страница 1757: ...4 9...
Страница 1770: ...6 4...
Страница 2017: ...2 11 Figure 2 3 SFTP client interface...
Страница 2062: ...i Table of Contents 1 URPF Configuration 1 1 URPF Overview 1 1 What is URPF 1 1 How URPF Works 1 1 Configuring URPF 1 2...
Страница 2238: ...1 16 DeviceA cfd linktrace service instance 1 mep 1001 target mep 4002...
Страница 2442: ...2 4 Set the interval for sending Syslog or trap messages to 20 seconds Device mac address information interval 20...