EasyManuals Logo

HPE FlexFabric 5940 SERIES User Manual

HPE FlexFabric 5940 SERIES
571 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #468 background imageLoading...
Page #468 background image
455
Configuring ARP attack protection
ARP attacks and viruses are threatening LAN security. This chapter describes multiple features used
to detect and prevent ARP attacks.
Although ARP is easy to implement, it provides no security mechanism and is vulnerable to network
attacks. An attacker can exploit ARP vulnerabilities to attack network devices in the following ways:
• Acts as a trusted user or gateway to send ARP packets so the receiving devices obtain
incorrect ARP entries.
• Sends a large number of unresolvable IP packets to have the receiving device busy with
resolving IP addresses until its CPU is overloaded. Unresolvable IP packets refer to IP packets
for which ARP cannot find corresponding MAC addresses.
• Sends a large number of ARP packets to overload the CPU of the receiving device.
ARP attack protection configuration task list
Tasks at a glance
Flood prevention:
• Configuring unresolvable IP attack protection (configur
ed on gateways)
{ Configuring ARP source suppression
{ Configuring ARP blackhole routing
• Configuring ARP packet rate limit (configured on access devices)
• Configuring source MAC-based ARP attack detection (configured on gateways)
User and gateway spoofing prevention:
• Configuring ARP packet source MAC consistency check (co
nfigured on gateways)
• Configuring ARP active acknowledgement (configured on gateways)
• Configuring authorized ARP (configured on gateways)
• Configuring ARP attack detection (configured on access devices)
• Configuring ARP scanning and fixed ARP (configured on gateways)
• Configuring ARP gateway protection (configured on access devices)
• Configuring ARP filtering (conf
igured on access devices)
• Configuring ARP sender IP address checking (configured on gateways)
Configuring unresolvable IP attack protection
If a device receives a large number of unresolvable IP packets from a host, the following situations
can occur:
• The device sends a large number of ARP requests, overloading the target subnets.
• The device keeps trying to resolve the destination IP addresses, overloading its CPU.
To protect the device from such IP attacks, you can configure the following features:
• ARP source suppression—Stops resolving packets from an IP address if the number of
unresolvable IP packets from the IP address exceeds the upper limit within 5 seconds. The
device continues ARP resolution when the interval elapses. This feature is applicable if the
attack packets have the same source addresses.
• ARP blackhole routing—Creates a blackhole route destined for an unresolved IP address.
The device drops all matching packets until the blackhole route is deleted. A blackhole route is
deleted when its aging timer is reached or the route becomes reachable.

Table of Contents

Other manuals for HPE FlexFabric 5940 SERIES

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the HPE FlexFabric 5940 SERIES and is the answer not in the manual?

HPE FlexFabric 5940 SERIES Specifications

General IconGeneral
BrandHPE
ModelFlexFabric 5940 SERIES
CategorySwitch
LanguageEnglish

Related product manuals