HP 6125G HP 6125G & 6125G/XG Blade Switches Security Configuration Gui - Page 9

Configuring ARP filtering, Auto-mode MFF configuration example in a tree network, vii

Page 9 highlights

Introduction 240 Configuration procedure 240 Configuring ARP active acknowledgement 240 Introduction 240 Configuration procedure 240 Configuring ARP detection 241 Introduction 241 Configuring user validity check 241 Configuring ARP packet validity check 242 Configuring ARP restricted forwarding 243 Displaying and maintaining ARP detection 243 User validity check configuration example 244 User validity check and ARP packet validity check configuration example 245 ARP restricted forwarding configuration example 246 Configuring ARP automatic scanning and fixed ARP 248 Configuration guidelines 248 Configuration procedure 249 Configuring ARP gateway protection 249 Configuration guidelines 249 Configuration procedure 249 Configuration example 250 Configuring ARP filtering 250 Configuration guidelines 251 Configuration procedure 251 Configuration example 251 Configuring ND attack defense 253 Overview 253 Enabling source MAC consistency check for ND packets 254 Configuring URPF 255 Overview 255 How URPF works 255 Configuring URPF 257 URPF configuration example 257 Configuring MFF 259 Overview 259 Basic concepts 260 Operation modes 260 Working mechanism 261 Protocols and standards 261 Configuring MFF 261 Configuration prerequisites 261 Enabling MFF 262 Configuring a network port 262 Enabling periodic gateway probe 262 Specifying the IP addresses of servers 262 Displaying and maintaining MFF 263 MFF configuration examples 263 Auto-mode MFF configuration example in a tree network 263 Auto-mode MFF configuration example in a ring network 265 Manual-mode MFF configuration example in a tree network 267 Manual-mode MFF configuration example in a ring network 268 vii

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285

vii
Introduction ·························································································································································· 240
Configuration procedure ···································································································································· 240
Configuring ARP active acknowledgement ··············································································································· 240
Introduction ·························································································································································· 240
Configuration procedure ···································································································································· 240
Configuring ARP detection ·········································································································································· 241
Introduction ·························································································································································· 241
Configuring user validity check ························································································································· 241
Configuring ARP packet validity check ············································································································· 242
Configuring ARP restricted forwarding ············································································································· 243
Displaying and maintaining ARP detection ······································································································ 243
User validity check configuration example······································································································· 244
User validity check and ARP packet validity check configuration example·················································· 245
ARP restricted forwarding configuration example ··························································································· 246
Configuring ARP automatic scanning and fixed ARP······························································································· 248
Configuration guidelines ···································································································································· 248
Configuration procedure ···································································································································· 249
Configuring ARP gateway protection ························································································································ 249
Configuration guidelines ···································································································································· 249
Configuration procedure ···································································································································· 249
Configuration example ······································································································································· 250
Configuring ARP filtering
············································································································································· 250
Configuration guidelines ···································································································································· 251
Configuration procedure ···································································································································· 251
Configuration example ······································································································································· 251
Configuring ND attack defense ····························································································································· 253
Overview······································································································································································· 253
Enabling source MAC consistency check for ND packets······················································································· 254
Configuring URPF ···················································································································································· 255
Overview······································································································································································· 255
How URPF works ·························································································································································· 255
Configuring URPF ························································································································································· 257
URPF configuration example ······································································································································· 257
Configuring MFF ····················································································································································· 259
Overview······································································································································································· 259
Basic concepts ····················································································································································· 260
Operation modes ················································································································································ 260
Working mechanism ··········································································································································· 261
Protocols and standards ····································································································································· 261
Configuring MFF ·························································································································································· 261
Configuration prerequisites ································································································································ 261
Enabling MFF ······················································································································································· 262
Configuring a network port ································································································································ 262
Enabling periodic gateway probe ···················································································································· 262
Specifying the IP addresses of servers ·············································································································· 262
Displaying and maintaining MFF ······························································································································· 263
MFF configuration examples······································································································································· 263
Auto-mode MFF configuration example in a tree network
·············································································· 263
Auto-mode MFF configuration example in a ring network ············································································· 265
Manual-mode MFF configuration example in a tree network········································································· 267
Manual-mode MFF configuration example in a ring network ········································································ 268