Chapter 26 IP Source Guard
MES-3528 User’s Guide
226
3
Configure trusted and untrusted ports, and specify the maximum number of DHCP
packets that each port can receive per second.
4
Configure static bindings.
26.1.2 ARP Inspection Overview
Use ARP inspection to filter unauthorized ARP packets on the network. This can
prevent many kinds of man-in-the-middle attacks, such as the one in the following
example.
Figure 117
Example: Man-in-the-middle Attack
In this example, computer B tries to establish a connection with computer A.
Computer X is in the same broadcast domain as computer A and intercepts the
ARP request for computer A. Then, computer X does the following things:
• It pretends to be computer A and responds to computer B.
• It pretends to be computer B and sends a message to computer A.
As a result, all the communication between computer A and computer B passes
through computer X. Computer X can read and alter the information passed
between them.
26.1.2.1 ARP Inspection and MAC Address Filters
When the Switch identifies an unauthorized ARP packet, it automatically creates a
MAC address filter to block traffic from the source MAC address and source VLAN
ID of the unauthorized ARP packet. You can configure how long the MAC address
filter remains in the Switch.
These MAC address filters are different than regular MAC address filters (
• They are stored only in volatile memory.
• They do not use the same space in memory that regular MAC address filters
use.
A
X
B
Содержание MES-3528 -
Страница 2: ......
Страница 8: ...Safety Warnings MES 3528 User s Guide 8 ...
Страница 22: ...22 ...
Страница 32: ...Chapter 2 Hardware Installation and Connection MES 3528 User s Guide 32 ...
Страница 42: ...Chapter 3 Hardware Overview MES 3528 User s Guide 42 ...
Страница 44: ...44 ...
Страница 60: ...Chapter 5 Initial Setup Example MES 3528 User s Guide 60 ...
Страница 76: ...Chapter 7 System Status and Port Statistics MES 3528 User s Guide 76 ...
Страница 88: ...Chapter 8 Basic Setting MES 3528 User s Guide 88 ...
Страница 90: ...90 ...
Страница 109: ...Chapter 9 VLAN MES 3528 User s Guide 109 Figure 57 Port Based VLAN Setup Port Isolation ...
Страница 114: ...Chapter 10 Static MAC Forward Setup MES 3528 User s Guide 114 ...
Страница 146: ...Chapter 14 Bandwidth Control MES 3528 User s Guide 146 ...
Страница 160: ...Chapter 17 Link Aggregation MES 3528 User s Guide 160 ...
Страница 168: ...Chapter 19 Port Security MES 3528 User s Guide 168 ...
Страница 180: ...Chapter 21 Policy Rule MES 3528 User s Guide 180 ...
Страница 192: ...Chapter 23 VLAN Stacking MES 3528 User s Guide 192 ...
Страница 231: ...Chapter 26 IP Source Guard MES 3528 User s Guide 231 Figure 120 DHCP Snooping ...
Страница 248: ...Chapter 26 IP Source Guard MES 3528 User s Guide 248 ...
Страница 257: ...257 PART IV IP Application Static Route 259 Differentiated Services 263 DHCP 267 ...
Страница 258: ...258 ...
Страница 262: ...Chapter 29 Static Route MES 3528 User s Guide 262 ...
Страница 274: ...Chapter 31 DHCP MES 3528 User s Guide 274 ...
Страница 276: ...276 ...
Страница 284: ...Chapter 32 Maintenance MES 3528 User s Guide 284 ...
Страница 306: ...Chapter 33 Access Control MES 3528 User s Guide 306 ...
Страница 312: ...Chapter 35 Syslog MES 3528 User s Guide 312 ...
Страница 320: ...Chapter 36 Cluster Management MES 3528 User s Guide 320 ...
Страница 324: ...Chapter 37 MAC Table MES 3528 User s Guide 324 ...
Страница 329: ...329 PART VI Troubleshooting Product Specifications Troubleshooting 331 Product Specifications 335 ...
Страница 330: ...330 ...
Страница 342: ...Chapter 41 Product Specifications MES 3528 User s Guide 342 ...
Страница 343: ...343 PART VII Appendices and Index Changing a Fuse 345 Common Services 347 Legal Information 351 Index 355 ...
Страница 344: ...344 ...
Страница 346: ...Appendix A Changing a Fuse MES 3528 User s Guide 346 ...
Страница 354: ...Appendix C Legal Information MES 3528 User s Guide 354 ...
Страница 364: ...Index MES 3528 User s Guide 364 ...