EasyManua.ls Logo

Huawei AR1200-S - Page 9

Huawei AR1200-S
308 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
5.3.9 (Optional) Enabling 802.1x Authentication Triggered by DHCP Messages........................................106
5.3.10 (Optional) Setting Values of Timers Used in 802.1x Authentication.................................................106
5.3.11 (Optional) Configuring the Quiet Timer Function..............................................................................107
5.3.12 (Optional) Configuring 802.1x Re-authentication...............................................................................108
5.3.13 (Optional) Configuring a Guest VLAN for 802.1x Authentication....................................................109
5.3.14 (Optional) Configuring a Restrict VLAN for 802.1x Authentication.................................................110
5.3.15 (Optional) Enabling the Handshake Function.....................................................................................111
5.3.16 (Optional) Setting the Maximum Number of Times the AR1200-S Sends Authentication Requests
........................................................................................................................................................................111
5.3.17 Checking the Configuration.................................................................................................................112
5.4 Configuring MAC Address Authentication....................................................................................................112
5.4.1 Establishing the Configuration Task.....................................................................................................112
5.4.2 Enabling Global MAC Address Authentication....................................................................................113
5.4.3 Enabling MAC Address Authentication on an Interface.......................................................................113
5.4.4 (Optional) Setting the Format of the User Name..................................................................................114
5.4.5 (Optional) Configuring a Domain for MAC Address Authentication...................................................115
5.4.6 (Optional) Setting Values for MAC Address Authentication Timers...................................................115
5.4.7 (Optional) Setting the Maximum Number of Users for MAC Address Authentication........................116
5.4.8 (Optional) Re-Authenticating a User with the Specified MAC Address..............................................117
5.4.9 Checking the Configuration...................................................................................................................117
5.5 Maintaining NAC...........................................................................................................................................118
5.5.1 Clearing the Statistics on 802.1x Authentication..................................................................................118
5.5.2 Clearing the Statistics on MAC Address Authentication......................................................................118
5.6 Configuration Examples.................................................................................................................................119
5.6.1 Example for Configuring 802.1x Authentication..................................................................................119
5.6.2 Example for Configuring MAC Address Authentication......................................................................122
6 ARP Security Configuration....................................................................................................125
6.1 ARP Security Overview.................................................................................................................................126
6.2 ARP Security Supported by the AR1200-S....................................................................................................126
6.3 Configuring ARP Entry Limiting...................................................................................................................128
6.3.1 Establishing the Configuration Task.....................................................................................................128
6.3.2 Enabling Strict ARP Learning...............................................................................................................129
6.3.3 Configuring Interface-based ARP Entry Limiting................................................................................129
6.3.4 Checking the Configuration...................................................................................................................130
6.4 Configuring ARP Anti-attack.........................................................................................................................131
6.4.1 Establishing the Configuration Task.....................................................................................................131
6.4.2 Configuring ARP Anti-spoofing...........................................................................................................132
6.4.3 Configuring the AR1200-S to Check Source MAC Address Consistency in ARP Packets.................132
6.4.4 Configuring ARP Gateway Anti-collision............................................................................................133
6.4.5 Configuring the AR1200-S to Send Gratuitous ARP Packets...............................................................133
6.4.6 Checking the Configuration...................................................................................................................135
6.5 Configuring ARP Suppression.......................................................................................................................136
Huawei AR1200-S Series Enterprise Routers
Configuration Guide - Security Contents
Issue 02 (2012-03-30) Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
viii

Table of Contents

Related product manuals