vi
About ARP attack detection ··················································································································· 182
Restrictions and guidelines: ARP attack detection ················································································· 183
Configuring user validity check ·············································································································· 183
Configuring ARP packet validity check ·································································································· 184
Configuring ARP restricted forwarding ··································································································· 185
Ignoring ingress ports of ARP packets during user validity check ························································· 186
Enabling ARP attack detection logging ·································································································· 186
Verifying and maintaining ARP attack detection ···················································································· 187
Configuring ARP scanning and fixed ARP ····································································································· 187
Triggering an ARP scanning ·················································································································· 188
Configuring automatic ARP scanning ···································································································· 188
Configuring fixed ARP ···························································································································· 189
Configuring ARP gateway protection ············································································································· 189
About ARP gateway protection ·············································································································· 189
Restrictions and guidelines ···················································································································· 189
Procedure ··············································································································································· 189
Example: Configuring ARP gateway protection ····················································································· 189
Configuring ARP filtering ································································································································ 190
ARP filtering ··········································································································································· 190
Restrictions and guidelines ···················································································································· 190
Procedure ··············································································································································· 191
Example: Configuring ARP filtering ········································································································ 191
Configuring ARP sender IP address checking ······························································································· 192
About ARP sender IP address checking ································································································ 192
Procedure ··············································································································································· 192
Configuring ND attack defense ·································································· 193
About ND attack defense ······························································································································· 193
Configuring ND packet rate limit ···················································································································· 193
Enabling source MAC consistency check for ND messages ········································································· 194
Configuring ND attack detection ···················································································································· 195
About ND attack detection ····················································································································· 195
Restrictions and guidelines for ND attack detection configuration ························································· 195
Configuring ND attack detection for a VSI ····························································································· 196
Enabling ND attack detection logging ···································································································· 196
Verifying and maintaining ND attack detection ······················································································ 197
Enabling ND scanning···································································································································· 197
Configuring attack detection and prevention ·············································· 198
About attack detection and prevention ··········································································································· 198
Attacks that the device can prevent ··············································································································· 198
Single-packet attacks ····························································································································· 198
Scanning attacks ···································································································································· 199
Flood attacks ·········································································································································· 200
TCP fragment attack ······························································································································ 201
Login DoS attack ···································································································································· 201
Login dictionary attack ··························································································································· 201
Attack detection and prevention tasks at a glance ························································································· 202
Configuring and applying an attack defense policy ························································································ 202
Creating an attack defense policy ·········································································································· 202
Configuring a single-packet attack defense policy ················································································· 202
Configuring a scanning attack defense policy ························································································ 204
Configuring a flood attack defense policy ······························································································ 204
Configuring attack detection exemption ································································································· 209
Applying an attack defense policy to the device ···················································································· 210
Enabling log non-aggregation for single-packet attack events ······································································ 210
Configuring TCP fragment attack prevention ································································································· 211
Enabling the login delay ································································································································· 211
Verifying and maintaining attack detection and prevention ············································································ 211
Verifying attack defense configuration ··································································································· 211
Displaying attack detection and prevention entries ················································································ 211
Displaying and clearing attack detection and prevention statistics ························································ 212