H3C Technologies H3C S3100 Series Switches User Manual
Page 961

i
Table of Contents
1 ARP and IP Attack Defense Configuration ································································································ 1
ARP Packet Filtering Based on Gateway’s Address ················································································· 1
Introduction········································································································································· 1
Configuring ARP Packet Filtering······································································································· 1
Introduction········································································································································· 2
Configuring the Maximum Number of Dynamic ARP Entries that a VLAN Interface Can Learn ······· 2
ARP/IP Attack Defense Based on 802.1x·································································································· 3
Overview············································································································································· 3
Introduction········································································································································· 4
ARP Attack Defense Configuration Example I··························································································· 5
Network Requirements ······················································································································· 5
Network Diagram································································································································ 5
Configuration Procedures··················································································································· 5
ARP Attack Defense Configuration Example II·························································································· 6
Network Requirements ······················································································································· 6
Network Diagram································································································································ 6
Configuration Procedures··················································································································· 6
ARP/IP Attack Defense Configuration Example III ···················································································· 7
Network Requirements ······················································································································· 7
Network Diagram································································································································ 7
Configuration Procedures··················································································································· 7