EasyManuals Logo

HP 5500 HI Series User Manual

HP 5500 HI Series
444 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #11 background imageLoading...
Page #11 background image
ix
Enabling the SYN Cookie feature ······························································································································ 349
Displaying and maintaining TCP attack protection ·································································································· 349
Configuring IP source guard ·································································································································· 351
Overview ······································································································································································· 351
Static IP source guard entries ····························································································································· 351
Dynamic IP source guard binding entries ········································································································· 352
Configuration task list ·················································································································································· 352
Configuring the IPv4 source guard function ·············································································································· 353
Configuring IPv4 source guard on a port ········································································································· 353
Configuring a static IPv4 source guard entry ··································································································· 354
Setting the maximum number of IPv4 source guard binding entries ····························································· 355
Configuring the IPv6 source guard function ·············································································································· 356
Configuring IPv6 source guard on a port ········································································································· 356
Configuring a static IPv6 source guard entry ··································································································· 357
Setting the maximum number of IPv6 source guard entries ············································································ 358
Displaying and maintaining IP source guard ············································································································ 358
IP source guard configuration examples ··················································································································· 359
Static IPv4 source guard configuration example ····························································································· 359
Dynamic IPv4 source guard using DHCP snooping configuration example ················································· 361
Dynamic IPv4 source guard using DHCP relay configuration example ························································ 362
Static IPv6 source guard configuration example ····························································································· 363
Dynamic IPv6 source guard using DHCPv6 snooping configuration example ············································· 364
Dynamic IPv6 source guard using ND snooping configuration example ····················································· 365
Global static IP source guard configuration example ····················································································· 366
Troubleshooting IP source guard ································································································································ 368
Configuring ARP attack protection ························································································································· 369
Overview ······································································································································································· 369
ARP attack protection configuration task list ············································································································· 369
Configuring ARP defense against IP packet attacks ································································································· 370
Configuring ARP source suppression ················································································································ 370
Enabling ARP black hole routing ······················································································································· 371
Displaying and maintaining ARP defense against IP packet attacks ····························································· 371
Configuration example ······································································································································· 371
Configuring ARP packet rate limit ······························································································································ 372
Introduction ·························································································································································· 372
Configuration procedure ···································································································································· 372
Configuring source MAC address based ARP attack detection ············································································· 373
Configuration procedure ···································································································································· 373
Displaying and maintaining source MAC address based ARP attack detection ·········································· 374
Configuration example ······································································································································· 374
Configuring ARP packet source MAC address consistency check ········································································· 376
Introduction ·························································································································································· 376
Configuration procedure ···································································································································· 376
Configuring ARP active acknowledgement ··············································································································· 376
Introduction ·························································································································································· 376
Configuration procedure ···································································································································· 376
Configuring ARP detection ·········································································································································· 377
Introduction ·························································································································································· 377
Configuring user validity check ························································································································· 377
Configuring ARP packet validity check ············································································································· 378
Configuring ARP restricted forwarding ············································································································· 379
Configuring the ARP detection logging function ······························································································ 379
Displaying and maintaining ARP detection ······································································································ 380

Table of Contents

Other manuals for HP 5500 HI Series

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the HP 5500 HI Series and is the answer not in the manual?

HP 5500 HI Series Specifications

General IconGeneral
BrandHP
Model5500 HI Series
CategorySwitch
LanguageEnglish

Related product manuals