
i
Contents
Introduction····································································································1
Prerequisites··································································································1
Example: Configuring link layer attack protection···········································2
Network configuration ········································································································································2
Analysis······························································································································································3
Software versions used······································································································································3
Restrictions and guidelines································································································································3
Procedures·························································································································································3
Configuring Device B ·································································································································3
Configuring Device A ·································································································································3
Configuring Device C·································································································································4
Verifying the configuration··································································································································5
Configuration files ··············································································································································5
Example: Configuring ARP attack protection·················································6
Network configuration ········································································································································6
Software versions used······································································································································7
Procedures·························································································································································7
Verifying the configuration··································································································································7
Configuration files ··············································································································································8
Example: Configuring network layer attack protection ···································8
Network configuration ········································································································································8
Software versions used······································································································································8
Restrictions and guidelines································································································································9
Procedures·························································································································································9
Verifying the configuration··································································································································9
Configuration files ··············································································································································9
Example: Configuring transport layer attack protection································10
Network configuration ······································································································································10
Software versions used····································································································································10
Procedures·······················································································································································10
Verifying the configuration································································································································10
Configuration files ············································································································································11
Related documentation················································································11