ARP anti-spoofing configuration on S series switch

Publication Date:  2016-11-21 Views:  268 Downloads:  0
Issue Description
ARP anti-spoofing configuration on S series switch
Solution
"The S series switch, except S1700, provides various methods to prevent ARP spoofing attacks.
Dynamic ARP inspection (DAI)
This function applies to the network where DHCP snooping is configured. It is recommended to configure DAI on the access switches.DAI can prevent man-in-the-middle attacks.
# Enable DAI on GE 1/0/1.
[HUAWEI] interface gigabitethernet 1/0/1
[HUAWEI-GigabitEthernet1/0/1] arp anti-attack check user-bind enable
# Enable DAI in VLAN 100.
[HUAWEI] vlan 100
[HUAWEI-vlan100] arp anti-attack check user-bind enable
- Configure fixed ARP.
To prevent ARP spoofing attacks, configure fixed ARP on the gateway.
# Enable fixed ARP in fixed MAC mode.
[HUAWEI] arp anti-attack entry-check fixed-mac enable
- Configure ARP gateway anti-collision (available on only S5720SI/S5720S-SI, S5720EI, S5720HI, S6720EI, and modular switches).
When user hosts are directly connected to the gateway, configure this function on the gateway.
# Enable ARP gateway anti-collision.
[HUAWEI] arp anti-attack gateway-duplicate enable
- Configure the switch to actively discard gratuitous ARP packets (only available on modular switches).
If you confirm that the gratuitous ARP packets are from attackers, enable the gateway to actively discard gratuitous ARP packets.
# Enable the switch to actively discard gratuitous ARP packets globally.
[HUAWEI] arp anti-attack gratuitous-arp drop"

END