beautypg.com

H3C Technologies H3C WX3000E Series Wireless Switches User Manual

Page 13

background image

vii

Configuring ARP attack protection ························································································································· 326

 

Overview ······································································································································································· 326

 

ARP attack protection configuration task list ············································································································· 326

 

Configuring unresolvable IP attack protection ·········································································································· 327

 

Introduction ·························································································································································· 327

 

Configuring ARP source suppression ················································································································ 327

 

Enabling ARP black hole routing ······················································································································· 328

 

Displaying and maintaining ARP source suppression ····················································································· 328

 

Unresolvable IP attack protection configuration example ··············································································· 328

 

Configuring ARP packet rate limit ······························································································································ 329

 

Introduction ·························································································································································· 329

 

Configuring ARP packet rate limit (in interface view) ······················································································ 329

 

Configuring source MAC address based ARP attack detection ············································································· 330

 

Configuration procedure ···································································································································· 330

 

Displaying and maintaining source MAC address based ARP attack detection ·········································· 331

 

Source MAC address based ARP attack detection configuration example ·················································· 331

 

Configuring ARP packet source MAC address consistency check ········································································· 333

 

Introduction ·························································································································································· 333

 

Configuration procedure ···································································································································· 333

 

Configuring ARP active acknowledgement ··············································································································· 333

 

Introduction ·························································································································································· 333

 

Configuration procedure ···································································································································· 333

 

Configuring ARP detection ·········································································································································· 333

 

Introduction ·························································································································································· 333

 

Configuring user validity check ························································································································· 334

 

Configuring ARP packet validity check ············································································································· 335

 

Configuring ARP restricted forwarding ············································································································· 336

 

Displaying and maintaining ARP detection ······································································································ 336

 

User validity check configuration example ······································································································· 336

 

User validity check and ARP packet validity check configuration example ·················································· 338

 

Configuring ARP gateway protection ························································································································ 340

 

ARP gateway protection configuration example ······························································································ 341

 

Configuring ARP filtering ············································································································································· 342

 

Introduction ·························································································································································· 342

 

Configuration procedure ···································································································································· 342

 

ARP filtering configuration example ·················································································································· 342

 

Configuring FIPS······················································································································································ 344

 

Overview ······································································································································································· 344

 

FIPS self-tests ································································································································································· 344

 

Power-up self-tests ················································································································································ 344

 

Conditional self-tests ············································································································································ 344

 

Triggered self-test ················································································································································· 344

 

Configuring FIPS ··························································································································································· 345

 

Prerequisites ························································································································································· 345

 

Enabling FIPS mode ············································································································································ 345

 

Triggering a self-test ············································································································································ 345

 

Displaying and maintaining FIPS ······························································································································· 346

 

Configuring IPsec ···················································································································································· 347

 

Overview ······································································································································································· 347

 

Basic concepts ····················································································································································· 347

 

IPsec stateful failover ··········································································································································· 349

 

Protocols and standards ····································································································································· 350

 

IPsec configuration task list ········································································································································· 350