EasyManuals Logo
Home>HP>Switch>5120 EI Switch Series

HP 5120 EI Switch Series User Manual

HP 5120 EI Switch Series
304 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #9 background imageLoading...
Page #9 background image
ix
Static IPv4 source guard binding entry configuration example ····································································· 256
Global static binding excluded port configuration example ·········································································· 257
Dynamic IPv4 source guard binding by DHCP snooping configuration example ······································· 259
Dynamic IPv4 source guard binding by DHCP relay configuration example ·············································· 260
Static IPv6 source guard binding entry configuration example ····································································· 261
Dynamic IPv6 source guard binding by DHCPv6 snooping configuration example ··································· 262
Dynamic IPv6 source guard binding by ND snooping configuration example ··········································· 263
Troubleshooting IP source guard ································································································································ 264
Neither static binding entries nor the dynamic binding function can be configured ·································· 264
ARP attack protection configuration ························································································································· 265
ARP attack protection overview ·································································································································· 265
ARP attack protection configuration task list ············································································································· 265
Configuring ARP defense against IP packet attacks ································································································· 266
Introduction ·························································································································································· 266
Configuring ARP source suppression ················································································································ 266
Enabling ARP black hole routing ······················································································································· 267
Displaying and maintaining ARP defense against IP packet attacks ····························································· 267
Configuring ARP packet rate limit ······························································································································ 267
Introduction ·························································································································································· 267
Configuring ARP packet rate limit ····················································································································· 267
Configuring source MAC address based ARP attack detection ············································································· 268
Introduction ·························································································································································· 268
Configuration procedure ···································································································································· 268
Displaying and maintaining source MAC address based ARP attack detection ········································· 269
Configuring ARP packet source MAC address consistency check ········································································· 269
Introduction ·························································································································································· 269
Configuration procedure ···································································································································· 269
Configuring ARP active acknowledgement ··············································································································· 270
Introduction ·························································································································································· 270
Configuration procedure ···································································································································· 270
Configuring ARP detection ·········································································································································· 270
Introduction ·························································································································································· 270
Enabling ARP detection based on static IP source guard binding Entries/DHCP snooping entries/802.1X
security entries/OUI MAC addresses ··············································································································· 271
Configuring ARP detection based on specified objects ·················································································· 272
Configuring ARP restricted forwarding ············································································································· 273
Displaying and maintaining ARP detection ······································································································ 273
ARP detection configuration example I ············································································································· 273
ARP detection configuration example II ············································································································ 275
ARP restricted forwarding configuration example ··························································································· 276
Configuring ARP automatic scanning and fixed ARP ······························································································ 278
Introduction ·························································································································································· 278
Configuration procedure ···································································································································· 278
Configuring ARP gateway protection ························································································································ 279
Introduction ·························································································································································· 279
Configuration procedure ···································································································································· 279
ARP gateway protection configuration example······························································································ 280
Configuring ARP filtering ············································································································································· 280
Introduction ·························································································································································· 280
Configuration procedure ···································································································································· 281
ARP filtering configuration example ·················································································································· 281
ND attack defense configuration ······························································································································ 283
Introduction to ND attack defense ······························································································································ 283
Enabling source MAC consistency check for ND packets······················································································· 284

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the HP 5120 EI Switch Series and is the answer not in the manual?

HP 5120 EI Switch Series Specifications

General IconGeneral
BrandHP
Model5120 EI Switch Series
CategorySwitch
LanguageEnglish

Related product manuals