Configuring IPv6 IMPB
Configuration Examples
User Guide
901
5
Configuration Examples
5.1 Example for ND Detection
5.1.1 Network Requirements
As shown below, User 1 and User 2 are legal IPv6 users in the LAN and connected to
port 1/0/1 and port 1/0/2. Both of them are in the default VLAN 1. The router has been
configured with security feature to prevent attacks from the WAN. Now the network
administrator wants to configure Switch A to prevent ND attacks from the LAN.
Figure 5-1
Network Topology
LAN
WAN
Gi1/0/3
Gi1/0/1
Gi1/0/2
Router
User 2
88-A9-D4-54-FD-C3
2001::6
User 1
74-D3-45-32-B6-8D
2001::5
Attacker
Switch A
Internet
5.1.2 Configuration Scheme
To meet the requirement, you can configure ND Detection to prevent the network from ND
attacks in the LAN.
The overview of configurations on the switch is as follows:
1) Configure IPv6-MAC Binding. The binding entries for User 1 and User 2 should be
manually bound.
2) Configure ND Detection globally.
Summary of Contents for JetStream T2600G-28TS
Page 264: ...Configuring VLAN VPN Configuration Examples User Guide 235 Figure 4 2 Create VLAN 100 ...
Page 265: ...User Guide 236 Configuring VLAN VPN Configuration Examples Figure 4 3 Create VLAN 200 ...
Page 268: ...Configuring VLAN VPN Configuration Examples User Guide 239 Figure 4 7 Creating VLAN 100 ...
Page 275: ...User Guide 246 Configuring VLAN VPN Configuration Examples Figure 4 11 Create VLAN 100 ...
Page 276: ...Configuring VLAN VPN Configuration Examples User Guide 247 Figure 4 12 Create VLAN 200 ...
Page 277: ...User Guide 248 Configuring VLAN VPN Configuration Examples Figure 4 13 Create VLAN 1050 ...
Page 280: ...Configuring VLAN VPN Configuration Examples User Guide 251 Figure 4 18 Creating VLAN 100 ...
Page 859: ...User Guide 830 Configuring ACL Configuration Example for ACL Figure 3 18 Configuring Rule 3 ...
Page 874: ...Configuring ACL User Guide 845 ...
Page 975: ...Part 33 Monitoring Traffic CHAPTERS 1 Traffic Monitor 2 Appendix Default Parameters ...