R211x-HP Flexfabric 11900 Security Command Reference

Table Of Contents
311
Usage guidelines
On a centralized device, if you do not specify any interface, the display arp source-mac command
displays ARP attack entries detected on all the interfaces.
Examples
# Display the ARP attack entries detected by source MAC-based ARP attack detection for the card in slot
1.
<Sysname> display arp source-mac slot 1
Source-MAC VLAN ID Interface Aging-time
23f3-1122-3344 4094 XGE1/0/1 10
23f3-1122-3355 4094 XGE1/0/2 30
23f3-1122-33ff 4094 XGE1/0/3 25
23f3-1122-33ad 4094 XGE1/0/4 30
23f3-1122-33ce 4094 XGE1/0/5 2
ARP packet source MAC consistency check
commands
arp valid-check enable
Use arp valid-check enable to enable ARP packet source MAC address consistency check on the
gateway.
Use undo arp valid-check enable to disable ARP packet source MAC address consistency check.
Syntax
arp valid-check enable
undo arp valid-check enable
Default
ARP packet source MAC address consistency check is disabled.
Views
System view
Predefined user roles
network-admin
mdc-admin
Usage guidelines
Configure this feature on gateways.
After you execute this command, the gateway device can filter out ARP packets whose source MAC
address in the Ethernet header is different from the sender MAC address in the message body.
Examples
# Enable ARP packet source MAC address consistency check.
<Sysname> system-view
[Sysname] arp valid-check enable