2-7
z
If access clients are small in number and use static IP addresses, it is recommended that you
configure static IP Source Guard binding entries and enable ARP detection based on DHCP
snooping entries on your access device.
Follow these steps to enable ARP detection for a VLAN and specify a trusted port:
To do…
Use the command…
Remarks
Enter system view
system-view
—
Enter VLAN view
vlan vlan-id
—
Enable ARP detection for the
VLAN
arp detection enable
Required
Disabled by default. That is, ARP
detection based on DHCP snooping
entries/static IP-to-MAC bindings is not
enabled by default.
Return to system view
quit
—
Enter Ethernet interface view
interface interface-type
interface-number
—
Configure the port as a
trusted port
arp detection trust
Optional
The port is an untrusted port by default.
Return to system view
quit
—
Specify an ARP attack
detection mode
arp detection mode
{
dhcp-snooping
|
static-bind
}
Required
No ARP attack detection mode is
specified by default; that is, all packets
are considered to be invalid by default.
Configure a static IP-to-MAC
binding for ARP detection
arp detection
static-bind ip-address
mac-address
Optional
Not configured by default.
If the ARP attack detection mode is
static-bind
, you need to configure static
IP-to-MAC bindings for ARP detection.
z
If all the detection types are specified, the system uses IP-to-MAC bindings first, then DHCP
snooping entries. If an ARP packet fails to pass ARP detection based on static IP-to-MAC bindings,
it is discarded. If the packet passes this detection, it will be checked against DHCP snooping
entries. If a match is found, the packet is considered to be valid. otherwise, the packet is discarded.
z
Before enabling ARP detection based on DHCP snooping entries, make sure that DHCP snooping
is enabled.
Configuring ARP Detection Based on Specified Objects
You can also specify objects in ARP packets to be detected. The objects involve:
z
src-mac: Checks whether the sender MAC address of an ARP packet is identical to the source
MAC address in the Ethernet header. If they are identical, the packet is forwarded; otherwise, the
packet is discarded.
Содержание S5810 Series
Страница 307: ...ii Configured Multicast Group Policy Fails to Take Effect 1 32...
Страница 648: ...1 8 Return to the upper directory Sysname cd Display the current working directory Sysname pwd flash...
Страница 812: ...1 7 Role Slave Sysname stack_3 DeviceD Device type S5810 50S MAC address 000f e200 1003...