beautypg.com

Configuring arp attack defense, Arp attack defense configuration task list – H3C Technologies H3C S3600 Series Switches User Manual

Page 605

background image

2-4

Figure 2-2 Gateway spoofing attack

To prevent gateway spoofing attacks, an S3600 series Ethernet switch can work as an access device

(usually with the upstream port connected to the gateway and the downstream ports connected to hosts)

and filter ARP packets based on the gateway’s address.

z

To filter APR attack packets arriving on a downstream port, you can bind the gateway’s IP address

to the downstream port (directly connected to hosts) of the switch. After that, the port will discard

ARP packets with the gateway’s IP address as the sender IP address, and permit other ARP

packets to pass.

z

To filter ARP attack packets arriving on the upstream port, you can bind the IP and MAC addresses

of the gateway to the cascaded port or upstream port of the access switch. After that, the port will

discard ARP packets with the sender IP address as the gateway’s IP address but with the sender

MAC address different from the gateway’s MAC address, and permit other ARP packets to pass.

An ARP trusted port has higher priority comparing with support for ARP packet filtering based on

gateway's address. That is, if you configure a cascaded port or an upstream port as an ARP trusted port,

the gateway's IP and MAC addresses configured on the port are ineffective.

Configuring ARP Attack Defense

ARP Attack Defense Configuration Task List

Complete the following tasks to configure ARP attack defense:

Task

Remarks

Configuring the Maximum Number of Dynamic
ARP Entries that a VLAN Interface Can Learn

Optional

The switch serves as a gateway.

Configuring ARP Source MAC Address
Consistency Check

Optional

The switch serves as a gateway or an access
device.

This manual is related to the following products: