11-19
Configuring Advanced Threat Protection
Dynamic ARP Protection
Adding an IP-to-MAC Binding to the DHCP Database
A routing switch maintains a DHCP binding database, which is used for DHCP
and ARP packet validation. Both the DHCP snooping and DHCP Option 82
insertion features maintain the lease database by learning the IP-to-MAC
bindings on untrusted ports. Each binding consists of the client MAC address,
port number, VLAN identifier, leased IP address, and lease time.
If your network does not use DHCP or if some network devices have fixed,
user-configured IP addresses, you can enter static IP-to-MAC address bindings
in the DHCP binding database. The switch uses manually configured static
bindings for DHCP snooping and dynamic ARP protection.
To add the static configuration of an IP-to-MAC binding for a port to the
database, enter the
ip source-binding
command at the global configuration
level.
An example of the
ip source-binding
command is shown here:
HP Switch(config)# ip source-binding 0030c1-7f49c0
interface vlan 100 10.10.20.1 interface 4
N o t e
Note that the
ip source-binding
command is the same command used by the
Dynamic IP Lockdown feature to configure static bindings. The Dynamic ARP
Protection and Dynamic IP Lockdown features share a common list of source
IP-to-MAC bindings.
Syntax:
[no] ip source-binding <
mac-address
> vlan <
vlan-id
> <
ip-address
>
interface <
port-number
>
mac-address
Specifies a MAC address to bind with a VLAN
and IP address on the specified port in the
DHCP binding database.
vlan
<vlan-id>
Specifies a VLAN ID number to bind with the
specified MAC and IP addresses on the speci-
fied port in the DHCP binding database.
ip-address
Specifies an IP address to bind with a VLAN
and MAC address on the specified port in the
DHCP binding database.
interface
<port-number>
Specifies the port number on which the IP-to-
MAC address and VLAN binding is configured
in the DHCP binding database.
Summary of Contents for E3800 Series
Page 2: ......
Page 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Page 30: ...xxviii ...
Page 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Page 186: ...4 72 Web and MAC Authentication Client Status ...
Page 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Page 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Page 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Page 730: ...20 Index ...
Page 731: ......