beautypg.com

H3C Technologies H3C S3100 Series Switches User Manual

Page 961

background image

i

Table of Contents

1 ARP and IP Attack Defense Configuration ································································································ 1

ARP Packet Filtering Based on Gateway’s Address ················································································· 1

Introduction········································································································································· 1

Configuring ARP Packet Filtering······································································································· 1

Configuring the Maximum Number of Dynamic ARP Entries a VLAN Interface Can Learn······················ 2

Introduction········································································································································· 2

Configuring the Maximum Number of Dynamic ARP Entries that a VLAN Interface Can Learn ······· 2

ARP/IP Attack Defense Based on 802.1x·································································································· 3

Overview············································································································································· 3

Configuring 802.1x-Based ARP/IP Attack Defense ··········································································· 3

Configuring ARP Source MAC Address Consistency Check····································································· 4

Introduction········································································································································· 4

Enabling ARP Source MAC Address Consistency Check ································································· 5

ARP Attack Defense Configuration Example I··························································································· 5

Network Requirements ······················································································································· 5

Network Diagram································································································································ 5

Configuration Procedures··················································································································· 5

ARP Attack Defense Configuration Example II·························································································· 6

Network Requirements ······················································································································· 6

Network Diagram································································································································ 6

Configuration Procedures··················································································································· 6

ARP/IP Attack Defense Configuration Example III ···················································································· 7

Network Requirements ······················································································································· 7

Network Diagram································································································································ 7

Configuration Procedures··················································································································· 7