Configuration Task Summary
Scenario | Description | Task |
---|---|---|
Bind static MAC addresses and interfaces |
Configure static MAC address entries to bind MAC addresses and interfaces, improving security of authorized users. |
|
Filter out attack packets |
Configure blackhole MAC address entries to filter out packets from unauthorized users, thereby protecting the system against attacks. |
|
Flexibly control aging of dynamic MAC address entries |
For stable networks, set a long aging time or set the aging time as 0 to not age dynamic MAC address entries. For other scenarios, set a short aging time. |
|
Control MAC address learning |
Certain network attacks aim to exhaust MAC address entries. To protect against this kind of attack, disable MAC address learning or limit the number of MAC address entries that can be learned. |
|
Monitor the MAC address table |
You can configure various alarm functions about MAC addresses to monitor the usage of MAC address entries.
|
|
Quickly update outbound interfaces in ARP entries |
Configure the MAC address-triggered ARP entry update function. When the outbound interface in a MAC address entry changes, the device updates the outbound interface in the corresponding ARP entry before ARP probing. This function shortens service interruption time. |
|
Prevent MAC address flapping |
MAC address flapping occurs on a network when the network has a loop or undergoes certain attacks. You can use the following methods to prevent MAC address flapping:
|
|
Detect MAC address flapping |
MAC address flapping occurs when a MAC address is learned by two interfaces in the same VLAN and the MAC address entry learned later overrides the earlier one. MAC address flapping detection enables a switch to check whether any MAC address flaps exist between interfaces and determine whether a loop exists. When MAC address flapping occurs, the switch sends an alarm to the NMS. The network maintenance personnel can locate the loop based on the alarm information and historical records for MAC address flapping. This greatly simplifies network maintenance. If the network connected to the switch does not support loop prevention protocols, configure the switch to shut down the interfaces where MAC address flapping occurs to reduce the impact of MAC address flapping on the network. |
|
Discard packets with an all-0 source or destination MAC address |
A faulty host or device may send packets with an all-0 source or destination MAC address to a switch. Configure the switch to discard such packets and send an alarm to the NMS to help the network administrator locate the faulty host or device. |
Configuring the Switch to Discard Packets with an All-0 MAC Address |
Discard packets in which destination MAC addresses do not match the MAC address table |
After a DHCP user goes offline, the MAC address entry of the user ages out. If there are packets destined for this user, the system cannot find the MAC address entry. The system then broadcasts the packets to all interfaces in the VLAN. In this case, all users receive the packets, which brings security risks. After the switch is configured to discard packets that do not match any MAC address entry, the switch discards such packets. This function mitigates the burden on the switch and enhances security. |
Configuring the Switch to Discard Packets That Do Not Match Any MAC Address Entry |
Forward packets from an interface when the source and destination MAC addresses are the same |
By default, an interface discards packets whose source and destination MAC addresses are the same. After the port bridge function is enabled on the interface, the interface forwards such packets. This function applies to a switch that connects to devices incapable of Layer 2 forwarding or functions as an access device in a data center. |