H3C Campus Fixed-Port Switches Web-Based Quick Start Configuration Guide-6W100

HomeSupportQuick StartH3C Campus Fixed-Port Switches Web-Based Quick Start Configuration Guide-6W100
20-ARP Attack Protection
Title Size Download
20-ARP Attack Protection 465.47 KB

Unresolvable IP Attack Protection Quick Start Configuration Guide

Network configuration

As shown in Figure 1, a LAN contains two areas: an R&D area in VLAN 10 and an office area in VLAN 20. Each area connects to the gateway (Switch C) through an access switch.

A large number of ARP requests are detected in the office area and are considered an attack caused by unresolvable IP packets. To prevent the attack, configure ARP source suppression or ARP blackhole routing.

Figure 1 Network diagram

 

Analysis

·     If the attack packets have different source addresses, configure ARP blackhole routing.

·     If the attack packets have the same source address, configure ARP source suppression and set the maximum number of unresolvable packets that can be processed per source IP address within 5 seconds. If unresolvable packets received from the IP address within 5 seconds exceed the limit, the gateway stops ARP resolution for the packets from that IP address until the 5 seconds elapse.

Procedures

1.     Enable ARP blackhole routing:

a.     Log in to the Web configuration interface for Switch C. From the left navigation pane, select Network > IP > ARP.

b.     Click the  icon in the right. On the ARP Advanced Settings page that opens, click ARP attack protection.

Figure 2 Entering the ARP attack protection page

 

c.     On the ARP attack protection page that opens, turn on the ARP blackhole routing feature.

Figure 3 Enabling the ARP blackhole routing feature

 

2.     Configure ARP source suppression:

On the ARP attack protection page, turn on the ARP source suppression feature and set the threshold to 100.

Figure 4 Enabling the ARP source suppression feature and setting the threshold

 

3.     Save the configuration:

Click the Save icon  at the upper left of the page.

Verifying the configuration

Verify the following:

·     When the unresolvable packets received from an IP address within 5 seconds exceed the limit, Switch C stops ARP resolution processing for the packets from that IP address until the 5 seconds elapse.

·     When the unresolvable packets have different source addresses, Switch C creates a blackhole route destined for each unresolved IP address and discards the packets.


ARP Attack Detection Quick Start Configuration Guide

Network configuration

As shown in Figure 5, configure Switch to perform user validity check and ARP packet validity check based on DHCP snooping entries for connected hosts.

Figure 5 Network diagram

 

Procedures

1.     Configure Gateway (DHCP server), and Host A and Host B (DHCP clients). (Details not shown.)

2.     Configure DHCP snooping for Switch:

a.     Access the Web configuration interface for Switch. From the left navigation pane, select Network > Links > DHCP Snooping.

b.     On the DHCP Snooping page that opens, perform the following tasks:

-     Click Enable DHCP Snooping.

Figure 6 Enabling DHCP snooping

 

-     Select Trusted Port for GigabitEthernet 1/0/3.

-     Select Binding Record for GigabitEthernet 1/0/1 and GigabitEthernet 1/0/2 to enable recording of client information in DHCP snooping entries on the two interfaces.

-     Click Apply.

Figure 7 Configuring the trusted interface and enabling recording of client information in DHCP snooping entries

 

c.     On the DHCP Snooping page, click the  icon at the upper right. On the DHCP Snooping Advanced Settings page that opens, configure the backup file. Select Local file and name the file as dhcp snooping binding record-001.

Figure 8 Saving the backup file locally

 

3.     Enable ARP attack detection on Switch.

a.     Access the configuration interface for Switch. From the left navigation pane, select Network > IP > ARP.

b.     Click the  icon at the upper right of the page. On the ARP Advanced Settings page that opens, click ARP attack protection.

Figure 9 Entering the ARP attack protection page

 

c.     On the ARP attack protection page that opens, select Access device protection > ARP Detection.

Figure 10 Entering the ARP Detection page

 

d.     On the ARP Detection page, select ARP Detection for the VLAN, and then click the Add icon .

Figure 11 Enabling ARP detection in the VLAN

 

e.     On the ARP Detection page, click Advanced settings.

Figure 12 Entering the ARP Detection Advanced Settings page

 

f.     On the ARP Detection Advanced Settings page, perform the following tasks:

-     Click ON for Source MAC address check, Destination MAC address check and IP address check to enable the services.

Figure 13 Configuring ARP packet validity check

 

-     Configure GigabitEthernet1/0/3 as a trusted interface, and then click the Add icon .

Figure 14 Configuring the trusted interface

 

4.     Save the configuration:

Click the Save icon  at the upper left of the page.

Verifying the configuration

Verify that Switch first checks the validity of ARP packets received on GigabitEthernet 1/0/1 and GigabitEthernet 1/0/2. If the ARP packets are confirmed valid, Switch performs user validity check by using the DHCP snooping entries.

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
All Support
  • Become a Partner
  • Partner Resources
  • Partner Business Management
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网