3com 5500-ei pwr Instruccion De Instalación

Descargar
Página de 1072
 
2-2 
Figure 2-1 Network diagram for ARP man-in-the-middle attack 
 
 
ARP attack detection 
To guard against the man-in-the-middle attacks launched by hackers or attackers, S5500-EI series 
Ethernet switches support the ARP attack detection function.  
After you enable ARP attack detection for a VLAN, 
When receiving an ARP request or response packet from an ARP untrusted port, the device 
delivers the ARP packet to the CPU to check the validity of the packet. If the packet is considered to 
be valid, it is forwarded; otherwise, it is discarded. 
ARP packets received from a trusted port of the VLAN are forwarded without validity check. 
After validity check, users are determined to be valid or invalid on the ports of the VLAN. Validity check 
can be based on DHCP-snooping entries, IP static binding entries, or IP-to-MAC mappings of 
authenticated 802.1x users, according to different network environments. 
If all the clients connected to the switch use IP addresses obtained through DHCP, you are 
recommended to enable DHCP snooping on the switch. The switch then checks validity of packets 
based on DHCP-snooping entries. 
If the clients connected to the switch use IP addresses configured manually and are few in number, 
you are recommended to configure IP static binding entries on the switch. The switch then checks 
validity of packets based on IP static binding entries. 
If a large number of 802.1x clients connected to the switch use IP addresses configured manually, 
you are recommended to enable ARP attack detection based on authenticated 802.1x clients on 
the switch. The switch then records mappings between IP addresses (both static and dynamic IP 
addresses) and MAC addresses of authenticated 802.1x clients and uses the mappings for ARP 
attack detection together with DHCP-snooping entries and IP static binding entries.