TP-Link TL-SL5428E User Guide - Page 169

ARP Defend

Page 169 highlights

Configuration Procedure: Step Operation Description 1 Bind the IP address, MAC Required. On the IP-MAC Binding page, bind the IP address, VLAN ID and the address, MAC address, VLAN ID and the connected Port connected Port number of number of the Host together via Manual Binding, ARP the Host together. Scanning or DHCP Snooping. 2 Enable the protection for the Required. On the Network Security→IP-MAC bound entry. Binding→Binding Table page, specify a protect type for the corresponding bound entry. 3 Specify the trusted port. Required. On the Network Security→ARP Inspection→ARP Detect page, specify the trusted port. The specific ports, such as up-linked port, routing port and LAG port, should be set as Trusted Port. 4 Enable ARP Detect feature. Required. On the Network Security→ARP Inspection→ARP Detect page, enable the ARP Detect feature. 13.2.2 ARP Defend With the ARP Defend enabled, the switch can terminate receiving the ARP packets for 300 seconds when the transmission speed of the legal ARP packet on the port exceeds the defined value so as to avoid ARP Attack flood. Choose the menu Network Security→ARP Inspection→ARP Defend to load the following page. Figure 13-14 ARP Defend The following entries are displayed on this screen: 161

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250

161
Configuration Procedure:
Step
Operation
Description
1
Bind the IP address, MAC
address, VLAN ID and the
connected Port number of
the Host together.
Required. On the
IP-MAC Binding
page, bind the IP
address, MAC address, VLAN ID and the connected Port
number of the Host together via Manual Binding, ARP
Scanning or DHCP Snooping.
2
Enable the protection for the
bound entry.
Required.
On
the
Network
Security
IP-MAC
Binding
Binding Table
page, specify a protect type for
the corresponding bound entry.
3
Specify the trusted port.
Required.
On
the
Network
Security
ARP
Inspection
ARP Detect
page, specify the trusted port.
The specific ports, such as up-linked port, routing port
and LAG port, should be set as Trusted Port.
4
Enable ARP Detect feature.
Required.
On
the
Network
Security
ARP
Inspection
ARP Detect
page, enable the ARP Detect
feature.
13.2.2 ARP Defend
With the ARP Defend enabled, the switch can terminate receiving the ARP packets for 300
seconds when the transmission speed of the legal ARP packet on the port exceeds the defined
value so as to avoid ARP Attack flood.
Choose the menu
Network Security
ARP Inspection
ARP Defend
to load the following page.
Figure 13-14 ARP Defend
The following entries are displayed on this screen: