i
Contents
Introduction ··································································································································································· 1
Prerequisites ·································································································································································· 1
Example: Configuring link layer attack protection ···································································································· 2
Network requirements ······················································································································································ 2
Requirements analysis ······················································································································································· 3
Software version used ······················································································································································ 3
Configuration restrictions and guidelines ······················································································································· 3
Configuration procedures ················································································································································ 4
Configuring Device B ··············································································································································· 4
Configuring Device A ·············································································································································· 4
Configuring Device C ·············································································································································· 5
Verifying the configuration ··············································································································································· 5
Configuration files ····························································································································································· 6
Example: Configuring ARP attack protection ············································································································· 7
Network requirements ······················································································································································ 7
Software version used ······················································································································································ 8
Configuration procedures ················································································································································ 8
Verifying the configuration ··············································································································································· 8
Configuration files ····························································································································································· 9
Example: Configuring network layer attack protection ····························································································· 9
Network requirements ······················································································································································ 9
Software version used ······················································································································································ 9
Configuration restrictions and guidelines ······················································································································· 9
Configuration procedures ················································································································································ 9
Verifying the configuration ············································································································································ 10
Configuration files ·························································································································································· 10
Example: Configuring transport layer attack protection ························································································· 10
Network requirements ··················································································································································· 10
Software version used ··················································································································································· 11
Configuration procedures ············································································································································· 11
Verifying the configuration ············································································································································ 11
Configuration files ·························································································································································· 11
Related documentation ·············································································································································· 12