H3C Low-End Ethernet Switches Configuration Examples
ARP Attack Prevention
Chapter 2 Configuration Examples
2-7
z
You can configure an uplink port on a switch as trusted or untrusted to flexibly
implement ARP attack detection for ARP requests and replies received on the port.
The ARP packets received from an ARP trusted port are not detected, while the
ARP packets received from other ports are detected based on the DHCP snooping
table and IP static bindings.
z
You are not recommended to configure ARP attack detection or ARP packet rate
limit on a port of an aggregation group.
2.2 Configuration Example for ARP Attack Prevention in
Authentication Mode
2.2.1 Network Requirements
In a campus network as shown in the following figure, the hosts are connected to the
gateway and servers through access switches. The administrator needs to configure
the gateway’s IP-to-MAC binding on the CAMS server for the clients to prevent
gateway spoofing attacks. The network requirements are as follows:
z
The hosts can be configured with IP addresses statically or obtain IP addresses
through DHCP. You need to install 802.1x client software on the hosts so that the
hosts need to pass 802.1x authentication before accessing the network.
z
The H3C CAMS server serves as an authentication, authorization, and accounting
server that provides the gateway’s IP-to-MAC binding to clients to prevent
gateway spoofing attacks.
z
You need to configure 802.1x and AAA on the access switches.