HP 5500 Ei 5500 Si Switch Series Configuration Guide
Here you can view all the pages of manual HP 5500 Ei 5500 Si Switch Series Configuration Guide. The HP manuals for Printer are available online for free. You can easily download all the documents as PDF.
Page 2021
356 Configuring source MAC address based ARP attack detection With this feature enabled, the device checks the source MAC address of ARP packets delivered to the CPU. It detects an attack when one MAC address sends more ARP packets in five seconds than the specified threshold. The device adds the MAC address to the attack detection table. Before the attack detection entry is aged out, the de vice uses either of the following detection modes to respond to the detected attack: • Monitor mode...
Page 2022
357 Task Command Remarks Display attacking MAC addresses detected by source MAC address based ARP attack detection. display arp anti-attack source-mac { slot slot-number | interface interface-type interface-number } [ | { begin | exclude | include } regular-expression ] Available in any view Configuration example Network requirements As shown in Figure 128 , the hosts access the Internet through a gateway (Device). If malicious users send a large number of ARP requests to the...
Page 2023
358 [Device] arp anti-attack source-mac filter # Set the threshold to 30. [Device] arp anti-attack source-mac threshold 30 # Set the age timer for detection entries to 60 seconds. [Device] arp anti-attack source-mac aging-time 60 # Configure 0012-3f86-e94c as a protected MAC address. [Device] arp anti-attack source-mac exclude-mac 0012-3f86-e94c Configuring ARP packet source MAC address consistency check Introduction The ARP packet source MAC address consistency check feature enables a...
Page 2024
359 Step Command Remarks 2. Enable the ARP active acknowledgement function. arp anti-attack active-ack enable Disabled by default Configuring ARP detection Introduction ARP detection enables access devices to block ARP packets from unauthorized clients to prevent user spoofing and gateway spoofing attacks. ARP detection provides the user validity check, ARP packet validity check, and ARP restricted forwarding functions. If both ARP packet validity check and user validity check are enabled,...
Page 2025
360 • At least the configured rules, static IP source guard binding entries, DHCP snooping entries, or 802.1X security entries must be available for user validity check. Otherwise, ARP packets received from ARP untrusted ports will be discarded, except the ARP packets with an OUI MAC address as the sender MAC address when voice VLAN is enabled. • You must specify a VLAN for an IP source guard binding entry; otherwise, no ARP packets can match the IP source guard binding entry. Configuration...
Page 2026
361 Step Command Remarks 1. Enter system view. system-view N/A 2. Enter VLAN view. vlan vlan-id N/A 3. Enable ARP detection for the VLAN. arp detection enable Disabled by default. 4. Return to system view. quit N/A 5. Enable ARP packet validity check and specify the objects to be checked. arp detection validate { dst-mac | ip | src-mac } * Disabled by default. 6. Enter Layer 2 Ethernet port/Layer 2 aggregate interface view. interface interface-type interface-number...
Page 2027
362 User validity check configuration example Network requirements As shown in Figure 129, conf igure Switch B to perform user validity check based on 802.1X security entries for connected hosts. Figure 129 Network diagram Configuration procedure 1. Add all the ports on Switch B into VLAN 10, and configure the IP address of VLAN-interface 10 on Switch A. (Details not shown.) 2. Configure Switch A as a DHCP server: # Configure DHCP address pool 0. system-view [SwitchA] dhcp enable...
Page 2028
363 [SwitchB-luser-test] password simple test [SwitchB-luser-test] quit # Enable ARP detection for VLAN 10. [SwitchB] vlan 10 [SwitchB-vlan10] arp detection enable # Configure the upstream port as a trusted port an d the downstream ports as untrusted ports (a port is an untrusted port by default). [SwitchB-vlan10] interface gigabitethernet 1/0/3 [SwitchB-GigabitEthernet1/0/3] arp detection trust [SwitchB-GigabitEthernet1/0/3] quit After the preceding configurations are complete, when ARP...
Page 2029
364 [SwitchA-dhcp-pool-0] network 10.1.1.0 mask 255.255.255.0 3. Configure Host A as DHCP client, and Host B as user. (Details not shown.) 4. Configure Switch B: # Enable DHCP snooping. system-view [SwitchB] dhcp-snooping [SwitchB] interface gigabitethernet 1/0/3 [SwitchB-GigabitEthernet1/0/3] dhcp-snooping trust [SwitchB-GigabitEthernet1/0/3] quit # Enable ARP detection for VLAN 10. [SwitchB] vlan 10 [SwitchB-vlan10] arp detection enable # Configure the upstream port as a trusted port...
Page 2030
365 Figure 131 Network diagram Configuration procedure 1. Configure VLAN 10, add ports to VLAN 10, and configure the IP address of the VLAN-interface, as shown in Figure 127. (D etails not shown.) 2. Configure the DHCP server on Switch A. # Configure DHCP address pool 0. system-view [SwitchA] dhcp enable [SwitchA] dhcp server ip-pool 0 [SwitchA-dhcp-pool-0] network 10.1.1.0 mask 255.255.255.0 3. Configure the DHCP client on Hosts A and B. (Details not shown.) 4. Configure Switch B....