No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search


To have a better experience, please upgrade your IE browser.


NE40E V800R010C10SPC500 Feature Description - Security 01

This is NE40E V800R010C10SPC500 Feature Description - Security
Rate and give feedback :
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Anti-ARP Spoofing Application

Anti-ARP Spoofing Application

Networking Description

On the network in Figure 3-5, hosts A, B, and C access the Internet through a gateway provider edge (PE). In normal situations, host A, host B, host C, and the PE all exchange Address Resolution Protocol (ARP) packets so that they can generate ARP entries for each other. When host C is attacked and the attacker constructs bogus ARP packets, host C broadcasts bogus ARP packets to modify ARP entries on host A, host B, or the PE. As a result, attackers can steal information from hosts A and B and prevent hosts A and B from accessing the network normally.

Figure 3-5 Networking diagram for anti-ARP spoofing

Feature Deployment

To solve the preceding problem, you can configure the following anti-ARP spoofing features on the PE:
  • Validity check of ARP packets

    After validity check of ARP packets is configured on the PE and the PE receives an ARP packet, the PE checks whether the source and destination MAC addresses carried in the Data field match those carried in the Ethernet header. If they match, the PE considers the packet valid and allows the packet to pass through. If they do not match, the PE considers the packet an attack packet and discards it.

Updated: 2019-01-03

Document ID: EDOC1100055047

Views: 12518

Downloads: 29

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Previous Next