
Chapter 78 Anti-Arpscan
XS3800-28 User’s Guide
582
C
HAPTER
78
Anti-Arpscan
78.1 Anti-Arpscan Overview
Address Resolution Protocol (ARP), RFC 826, is a protocol used to convert a network-layer IP address to a
link-layer MAC address. ARP scan is used to scan the network of a certain interface for alive hosts. It
shows the IP address and MAC addresses of all hosts found. Hackers could use ARP scan to find targets
in your network.
Anti-arpscan
is used to detect unusual ARP scan activity and block suspicious hosts or
ports.
Unusual ARP scan activity is determined by port and host thresholds that you set. A port threshold is
determined by the number of packets received per second on the port. If the received packet rate is
over the threshold, then the port is put into an
Err-Disable
state. You can recover the normal state of the
port manually if this happens and after you identify the cause of the problem.
A host threshold is determined by the number of ARP-request packets received per second. There is a
global threshold rate for all hosts. If the rate of a host is over the threshold, then that host is blocked by
using a MAC address filter. A blocked host is released automatically after the MAC aging time expires.
Note: A port-based threshold must be larger than the host-based threshold or the host-based
threshold will not work.
78.1.1 What You Can Do
• Use the
Anti-Arpscan Status
) to see what ports are trusted and are
forwarding traffic or are disabled.
• Use the
Anti-Arpscan Host Status
screen (
) to view blocked hosts and clear
selected ones.
• Use this
Anti-Arpscan Setup
screen (
) to enable anti-arpscan, set port and
host thresholds as well as configure ports to be trusted or untrusted.
• Use the
Anti-Arpscan Trust Host
screen (
) to create or remove trusted hosts
identified by IP address and subnet mask.
Anti-arpscan
is not performed on trusted hosts.
78.1.2 What You Need to Know
• You should set an uplink port as a trusted port before enabling
Anti-arpscan
so as to prevent the port
from being shutdown due to receiving too many ARP messages.
• When a port is configured as a trusted port,
Anti-arpscan
is not performed on the port. Both host and
port thresholds are ignored for trusted ports. If the received ARP packet rate on a port or the received
ARP-requests from a host exceed the thresholds, the trusted port will not be closed.
• If a port on the Switch is closed by
Anti-arpscan
, and you want to recover it, then do one of the
following:
Содержание XS3800-28
Страница 29: ...29 PART I User s Guide...
Страница 54: ...54 PART II Technical Reference...
Страница 88: ...Chapter 4 Web Configurator XS3800 28 User s Guide 88 Figure 51 Online Web Help...
Страница 123: ...Chapter 13 Neighbor XS3800 28 User s Guide 123 Figure 77 MONITOR Neighbor Neighbor Details Standalone Mode...
Страница 139: ...Chapter 17 System Information XS3800 28 User s Guide 139 Figure 90 MONITOR System Information Standalone Mode...
Страница 148: ...Chapter 20 Cloud Management XS3800 28 User s Guide 148 Figure 94 SYSTEM Cloud Management...
Страница 221: ...Chapter 33 Green Ethernet XS3800 28 User s Guide 221 Figure 149 PORT Green Ethernet Standalone Mode...
Страница 263: ...Chapter 36 OAM XS3800 28 User s Guide 263 Figure 182 PORT OAM OAM Status OAM Details...
Страница 334: ...Chapter 44 Multicast XS3800 28 User s Guide 334 Figure 248 MVR Group Configuration Example View...
Страница 406: ...Chapter 54 Spanning Tree Protocol XS3800 28 User s Guide 406 Figure 302 MSTP and Legacy RSTP Network Example...
Страница 420: ...Chapter 57 VLAN XS3800 28 User s Guide 420 Figure 315 SWITHCING VLAN VLAN Setup Static VLAN Add Edit Standalone Mode...
Страница 439: ...Chapter 57 VLAN XS3800 28 User s Guide 439 Figure 336 SWITCHING VLAN Port Based VLAN Setup Port Isolation...
Страница 540: ...Chapter 72 VRRP XS3800 28 User s Guide 540 Figure 434 VRRP Example 2 VRRP Status on Switch B...
Страница 581: ...Chapter 77 Policy Rule XS3800 28 User s Guide 581 Figure 456 Policy Example...
Страница 658: ...Chapter 86 Port Security XS3800 28 User s Guide 658 Figure 521 SECURITY Port Security Standalone Mode...
Страница 678: ...Chapter 87 MAINTENANCE XS3800 28 User s Guide 678 Figure 542 MAINTENANCE Configuration Configure Clone Stacking Mode...
Страница 680: ...Chapter 87 MAINTENANCE XS3800 28 User s Guide 680 Figure 543 MAINTENANCE Diagnostic Standalone Mode...
Страница 684: ...Chapter 87 MAINTENANCE XS3800 28 User s Guide 684 Figure 545 MAINTENANCE Firmware Upgrade Standalone Mode...
Страница 747: ...747 PART III Troubleshooting and Appendices...