To defend against the preceding attacks, configure MPAC policies on sub-interfaces, interfaces, and the entire system. MPAC policies include permitting or forbidding packets of certain protocols to be sent to the CPU, and permitting or prohibiting packets that match with certain source or destination IP addresses to be sent to the CPU.
MPAC protects switches against attacks. An MPAC-enabled switch filters packets destined for the CPU based on MPAC policies and discards unnecessary packets to prevent attacks to the CPU.
Configure an IPv4 MPAC policy.
<HUAWEI> system-view [HUAWEI] service-security policy ipv4 test //Create an IPv4 MPAC policy named test. [HUAWEI-service-sec-test] rule 10 deny protocol ip source-ip 10.10.1.1 0 [HUAWEI-service-sec-test] quit [HUAWEI] service-security global-binding ipv4 test //Apply the test polcy globally. You can configure MPAC policy rules globally or on sub-interfaces or interfaceds as required.
Configure an IPv6 MPAC policy.
<HUAWEI> system-view [HUAWEI] service-security policy ipv6 huawei //Create an IPv6 MPAC policy named huawei. [HUAWEI-service-sec-huawei] rule 10 deny protocol ip source-ip fc00::1/64 [HUAWEI-service-sec-huawei] quit [HUAWEI] service-security global-binding ipv6 huawei //Apply the huawei polcy globally. You can configure MPAC policy rules globally or on sub-interfaces or interfaceds as required.