3com 5500-ei pwr Installation Instruction

Page of 1072
 
2-11 
ARP Attack Defense Configuration Example III 
Network Requirements 
Host A and Host B are connected to Gateway (Switch A) through a Layer 2 switch (Switch B). To 
prevent ARP attacks such as ARP flooding:  
Enable ARP packet source MAC address consistency check on Switch A to block ARP packets 
with the sender MAC address different from the source MAC address in the Ethernet header.  
Limit the number of dynamic ARP entries learned on VLAN-interface 1.  
Network Diagram 
Figure 2-5 Network diagram for ARP attack defense 
Switch A (Gateway)
 Switch B
Host B
Host A
Vlan-int
192.168.1.1/24
 
 
Configuration Procedures 
# Enter system view.  
<SwitchA> system-view 
# Enable ARP source MAC address consistency check.  
[SwitchA] arp anti-attack valid-check enable 
# Enter VLAN-interface 1 view.  
[SwitchA] interface vlan-interface 1 
# Configure an IP address for VLAN-interface 1.  
[SwitchA-Vlan-interface1] ip address 192.168.1.1 24 
# Configure the maximum number of ARP entries that can be learned by VLAN-interface 1 as 500.  
[SwitchA-Vlan-interface1] arp max-learning-num 500 
[SwitchA-Vlan-interface1] quit 
ARP Attack Defense Configuration Example IV 
Network Requirements 
Host A is assigned with an IP address statically and installed with an 802.1x client.  
A CAMS authentication, authorization and accounting server serves as the authentication server.