No relevant resource is found in the selected language.
Your browser version is too early. Some functions of the website may be unavailable. To obtain better user experience, upgrade the browser to the latest version.
CloudEngine 12800 and 12800E V200R005C10 Configuration Guide - Security
This document describes the configurations of Security, including AAA, 802.1x Authentication, ACL, TCAM ACL Customization, local attack defense, Microsegmentation, MFF, attack defense, traffic suppression and storm control, ARP security, Port security, MACsec, DHCP snooping, IPSG, URPF, SSL, Keychain and FIPS.
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document.
Note: Even the most advanced machine translation cannot match the quality of professional translators.
Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Configuring Interface-based ARP Entry Limit
Configuring Interface-based ARP Entry Limit
Context
To prevent ARP entries from being exhausted by ARP attacks from a host connecting to an interface on the device, set the maximum number of ARP entries that the interface can dynamically learn. When the number of ARP entries learned by a specified interface reaches the maximum number, the interface cannot dynamically learn new ARP entries.
Perform the following steps on the gateway.
Procedure
Configuring ARP entry limit on a Layer 2 interface
Run system-view
The system view is displayed.
Run interfaceinterface-typeinterface-number
The interface view is displayed.
Run arp limitvlanvlan-id1 [ tovlan-id2 ] maximum
ARP entry limit on the Layer 2 interface is configured.
By default, the maximum number of ARP entries that an interface can dynamically learn is the same as the number of ARP entries supported by the device.
Run commit
The configuration is committed.
Configuring ARP entry limit on a Layer 3 interface
Run system-view
The system view is displayed.
Run interfaceinterface-typeinterface-number
The interface view is displayed.
On an Ethernet interface, run undo portswitch
The interface is switched to Layer 3 mode.
By default, an Ethernet interface works in Layer 2 mode.
The mode switching function takes effect when the interface only has attribute configurations (for example, shutdown and description configurations). Alternatively, if configuration information supported by both Layer 2 and Layer 3 interfaces exists (for example, mode lacp and lacp system-id configurations), no configuration that is not supported after the working mode of the interface is switched can exist. If unsupported configurations exist on the interface, delete the configurations first and then run the undo portswitch command.
If many Ethernet interfaces need to be switched to Layer 3 mode, run the undo portswitch batchinterface-type { interface-number1 [ tointerface-number2 ] } &<1-10> command in the system view to switch these interfaces to Layer 3 mode in batches.
Run arp limitmaximum
ARP entry limit on the Layer 3 interface is configured.
By default, the maximum number of ARP entries that an interface can dynamically learn is the same as the number of ARP entries supported by the device.
Run commit
The configuration is committed.
Follow-up Procedure
After configuring ARP entry limit on a VBDIF interface, you can run the arp limit alarm-thresholdthreshold-value command on the interface to configure an alarm threshold. When the number of ARP entries learned by the VBDIF interface reaches the alarm threshold, the switch sends an alarm notifying the user of the need to delete excess dynamic ARP entries.
By default, the alarm threshold for ARP entry limit on a VBDIF interface is 80%.