11-17
Configuring Advanced Threat Protection
Dynamic ARP Protection
Enabling Dynamic ARP Protection
To enable dynamic ARP protection for VLAN traffic on a routing switch, enter
the
arp-protect
vlan
command at the global configuration level.
An example of the
arp-protect
vlan
command is shown here:
HP Switch(config)# arp-protect vlan 1-101
Configuring Trusted Ports
In a similar way to DHCP snooping, dynamic ARP protection allows you to
configure VLAN interfaces in two categories: trusted and untrusted ports. ARP
packets received on trusted ports are forwarded without validation.
By default, all ports on a switch are untrusted. If a VLAN interface is untrusted:
■
The switch intercepts all ARP requests and responses on the port.
■
Each intercepted packet is checked to see if its IP-to-MAC binding is valid.
If a binding is invalid, the switch drops the packet.
You must configure trusted ports carefully. For example, in the topology in
Figure 11-9, Switch B may not see the leased IP address that Host 1 receives
from the DHCP server. If the port on Switch B that is connected to Switch A
is untrusted and if Switch B has dynamic ARP protection enabled, it will see
ARP packets from Host 1 as invalid, resulting in a loss of connectivity.
On the other hand, if Switch A does not support dynamic ARP protection and
you configure the port on Switch B connected to Switch A as trusted, Switch B
opens itself to possible ARP poisoning from hosts attached to Switch A.
Syntax:
[no] arp-protect vlan [
vlan-range
]
vlan-range
Specifies a VLAN ID or a range of VLAN IDs from
one to 4094; for example,
1–200.
Содержание E3800 Series
Страница 1: ...HP Switch Software E3800 switches Software version KA 15 03 September 2011 Access Security Guide ...
Страница 2: ......
Страница 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Страница 30: ...xxviii ...
Страница 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Страница 186: ...4 72 Web and MAC Authentication Client Status ...
Страница 290: ...6 74 RADIUS Authentication Authorization and Accounting Dynamic Removal of Authentication Limits ...
Страница 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Страница 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Страница 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Страница 659: ...14 11 Configuring and Monitoring Port Security Port Security Figure 14 5 Examples of Show Mac Address Outputs ...
Страница 730: ...20 Index ...
Страница 731: ......