
i
Contents
Introduction··································································································································································· 1
Prerequisites·································································································································································· 1
Example: Configuring link layer attack protection ···································································································· 2
Network requirements ······················································································································································2
Requirements analysis·······················································································································································3
Software version used ······················································································································································3
Configuration restrictions and guidelines·······················································································································3
Configuration procedures ················································································································································4
Configuring Device B···············································································································································4
Configuring Device A ··············································································································································4
Configuring Device C ··············································································································································5
Verifying the configuration···············································································································································5
Configuration files·····························································································································································6
Example: Configuring ARP attack protection············································································································· 7
Network requirements ······················································································································································7
Software version used ······················································································································································8
Configuration procedures ················································································································································8
Verifying the configuration···············································································································································8
Configuration files·····························································································································································9
Example: Configuring network layer attack protection····························································································· 9
Network requirements ······················································································································································9
Software version used ······················································································································································9
Configuration restrictions and guidelines·······················································································································9
Configuration procedures ················································································································································9
Verifying the configuration············································································································································ 10
Configuration files·························································································································································· 10
Example: Configuring transport layer attack protection ·························································································10
Network requirements ··················································································································································· 10
Software version used ··················································································································································· 11
Configuration procedures ············································································································································· 11
Verifying the configuration············································································································································ 11
Configuration files·························································································································································· 11
Related documentation ··············································································································································12