3-12
z
Enable IP filtering on Ethernet1/0/2, Ethernet1/0/3, and Ethernet1/0/4 to prevent attacks to the
server from clients using fake source IP addresses.
z
Create static binding entries on the switch, so that Host A using a fixed IP address can access the
external network.
Network diagram
Figure 3-9
Network diagram for IP filtering configuration
Switch
DHCP Snooping
Eth1/0/2
Client C
Eth1/0/1
DHCP Server
Client B
Host A
IP:1.1.1.1
MAC:0001-0001-0001
Eth1/0/3
Eth1/0/4
Configuration procedure
# Enable DHCP snooping on the switch.
<Switch> system-view
[Switch] dhcp-snooping
# Specify Ethernet1/0/1 as the trusted port.
[Switch] interface Ethernet1/0/1
[Switch-Ethernet1/0/1] dhcp-snooping trust
[Switch-Ethernet1/0/1] quit
# Enable IP filtering on Ethernet1/0/2, Ethernet1/0/3, and Ethernet1/0/4 to filter packets based on the
source IP addresses/MAC addresses.
[Switch] interface Ethernet1/0/2
[Switch-Ethernet1/0/2] ip check source ip-address mac-address
[Switch-Ethernet1/0/2] quit
[Switch] interface Ethernet1/0/3
[Switch-Ethernet1/0/3] ip check source ip-address mac-address
[Switch-Ethernet1/0/3] quit
[Switch] interface Ethernet1/0/4
[Switch-Ethernet1/0/4] ip check source ip-address mac-address
[Switch-Ethernet1/0/4] quit
# Create static binding entries on Ethernet1/0/2 of the switch.
[Switch] interface Ethernet1/0/2