No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

Configuration Guide - Security

CloudEngine 8800, 7800, 6800, and 5800 V200R005C10

This document describes the configurations of Security, including ACL, local attack defense, MFF, attack defense, traffic suppression and storm control, ARP security, Port security, DHCP snooping, ND snooping, PPPoE+, IPSG, SAVI, separating the management plane from the service plane, security risks.
Rate and give feedback :
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Configuring ARP Gateway Anti-Collision

Configuring ARP Gateway Anti-Collision

Context

If an attacker forges the gateway address to send ARP packets with the source IP address being the IP address of the gateway on the LAN, ARP entries on hosts in the LAN record the incorrect gateway address. As a result, all traffic from user hosts to the gateway is sent to the attacker and the attacker intercepts user information. Communication of users is interrupted. To defend against bogus gateways, you can enable the ARP bogus gateway attack defense function on gateways directly connected to the host.

When the following conditions are met and the check-all parameter is not specified, the switch considers that the IP address in the ARP packet conflicts with the gateway address:
  • The interface receiving the packet is a VLANIF or VBDIF interface.
  • The source IP address in the ARP packet is the same as the IP address of the interface that receives the packet.
  • The source MAC address in the Ethernet packet header and source MAC address in the ARP packet are different from the interface MAC address.
  • The source MAC address in the received packet is not a VRRP virtual MAC address.
In this situation, the switch generates ARP attack defense entries (the entries are not generated if the VRRP virtual MAC address is used), and discards the packets of which the VLAN IDs (or BDs) and source MAC addresses match the entries within a period of time. This prevents the ARP packets conflicting with the gateway address from being broadcast in the VLAN or BD.

If the check-all parameter is specified and the source IP address in a received ARP packet is the same as the local address, the switch considers that the ARP packet conflicts with the gateway address.

The check-all parameter enhances the ARP gateway anti-collision function. When the switch detects a bogus gateway, the gateway reports an alarm and sends a gratuitous ARP packet so that user hosts can update the ARP entries.

Procedure

  1. Run system-view

    The system view is displayed.

  2. Run arp anti-attack gateway-duplicate [ check-all ] enable

    ARP gateway anti-collision is enabled.

    By default, ARP gateway anti-collision is disabled.

    NOTE:

    Only the CE6850HI, CE6850U-HI, CE6851HI, CE6855HI, CE6856HI, CE6857EI, CE6860EI, CE6865EI, CE6870EI, CE6875EI, CE7850EI, CE7855EI, CE8850EI, CE8861EI, CE8868EI, and CE8860EI support the check-all parameter.

Follow-up Procedure

  • To view the ARP gateway anti-collision entries in the case that the check-all parameter is not specified for the ARP gateway anti-collision function, run the display arp anti-attack gateway-duplicate item command.
  • To view the ARP gateway anti-collision entries in the case that the check-all parameter is specified for the ARP gateway anti-collision function, run the display arp anti-attack gateway-duplicate information command.
    NOTE:

    Only the CE6850HI, CE6850U-HI, CE6851HI, CE6855HI, CE6856HI, CE6857EI, CE6860EI, CE6865EI, CE6870EI, CE6875EI, CE7850EI, CE7855EI, CE8850EI, CE8861EI, CE8868EI, and CE8860EI support the command.

Translation
Download
Updated: 2019-04-20

Document ID: EDOC1100074765

Views: 18438

Downloads: 61

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Share
Previous Next