D-Link DGS-3612G Product Manual - Page 369

Allow Zero IP, Forward DHCP PKT, Stop Learning, Threshold 0-500, Recover Learning, Max Entry 1-50

Page 369 highlights

xStack® DGS-3600 Series Layer 3 Managed Gigabit Ethernet Switch until a legal IP packet is detected. Enabled (Strict+IPv6) - Enable the IPv6 packet checking in strict mode. All packets are dropped by default until a legal IP packet is detected. Enabled (Strict+All) - Enable both IPv6 and IPv4 packet checking in strict mode. All packets are dropped by default until a legal IP packet is detected. Enabled (Loose+IPv6) - Enable IPv6 packet checking. All packets are dropped by default until a legal IP packet is detected. Enabled (Loose+All) - Enable both IPv6 and IPv4 packet checking. All packets are dropped by default until a legal IP packet is detected. Disabled - Disable the IPv4 packet checking. Disabled (IPv6) - Disable the IPv6 packet checking. Disabled (All) - Disable both IPv4 and IPv6 packet checking. Allow Zero IP Use the pull-down menu to enable or disable this feature. Once Enabled, the Switch will allow ARP packets with a Source IP of 0.0.0.0 to pass through. This is useful in some scenarios when a client (for example, a wireless Access Point) sends out an ARP request packet before accepting the IP address from a DHCP server. In this case, the ARP request packet sent out from the client will contain a Source IP of 0.0.0.0. The Switch will need to allow such packets to pass, or else the client cannot know if there is another duplicate IP address in the network. Forward DHCP PKT By default, the Switch will forward all DHCP packets. However, if the port state is set to Strict, all DHCP packets will be dropped. In that case, select Enabled so that the port will forward DHCP packets even under Strict state. Enabling this feature also ensures that DHCP snooping works properly. Mode Stop Learning Threshold (0-500) Recover Learning Max Entry (1-50) ARP - ARP mode is the default mode that applies to IMPB enabled ports. In ARP mode, if the Switch identifies the host is legal, the host's MAC will be programed to L2 FDB with allowed; otherwise the host's MAC will be programmed to L2 FDB with drop. ARP mode for security access control is based on Layer 2 MAC address. ACL - ACL mode provides strict security for IP level traffic. If ACL mode is enabled, the static configured IMPB entries with ACL mode will be applied to hardware ACL table. If the ACL mode is disabled, the ACL entries will be removed from the hardware ACL table. Whenever a MAC address is blocked by the Switch, it will be recorded in the Switch's L2 Forwarding Database (FDB) and associated with a particular port. To prevent the Switch FDB from overloading in case of an ARP DoS attack, the administrator can configure the threshold when a port should stop learning illegal MAC addresses. Enter a Stop Learning threshold between 0 and 500. Entering 500 means the port will enter the Stop Learning state after 500 illegal MAC entries and will not allow additional MAC entries, both legal or illegal, to be learned on this port. In the Stop Learning state, the port will also automatically purge all blocked MAC entries on this port. Traffic from legal MAC entries are still forwarded. Entering 0 means no limit has been set and the port will keep learning illegal MAC addresses. Use the Normal check box to recover learning. This feature can only be applied when a port is already in the Stop Learning state. Tick to recover the port back to normal state, under which the port will start learning both illegal and legal MAC addresses again. Enter the maximum number of IP-MAC-port binding dynamic entries. By default, the per port maximum dynamic entry is "No Limit." The maximum dynamic entry threshold is from 1 to 50. Tick the No Limit check box to allow no limit. This setting is only for DHCP snooping for IPv4. ND snooping and DHCP snooping for IPv6 are not supported. 353

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442
  • 443
  • 444
  • 445
  • 446
  • 447
  • 448
  • 449
  • 450
  • 451
  • 452
  • 453
  • 454
  • 455
  • 456
  • 457
  • 458
  • 459
  • 460
  • 461
  • 462
  • 463
  • 464
  • 465
  • 466
  • 467
  • 468
  • 469
  • 470
  • 471
  • 472
  • 473
  • 474
  • 475
  • 476
  • 477
  • 478
  • 479
  • 480
  • 481
  • 482
  • 483
  • 484
  • 485
  • 486
  • 487
  • 488
  • 489
  • 490
  • 491
  • 492
  • 493
  • 494
  • 495
  • 496
  • 497
  • 498
  • 499
  • 500
  • 501
  • 502
  • 503
  • 504
  • 505
  • 506
  • 507
  • 508
  • 509
  • 510
  • 511
  • 512
  • 513
  • 514
  • 515
  • 516
  • 517
  • 518
  • 519
  • 520
  • 521
  • 522
  • 523
  • 524
  • 525
  • 526
  • 527
  • 528
  • 529
  • 530
  • 531
  • 532
  • 533
  • 534
  • 535
  • 536
  • 537
  • 538
  • 539
  • 540
  • 541
  • 542
  • 543
  • 544
  • 545
  • 546

xStack
®
DGS-3600 Series Layer 3 Managed Gigabit Ethernet Switch
until a legal IP packet is detected.
Enabled (Strict+IPv6) -
Enable the IPv6 packet checking in strict mode. All packets are
dropped by default until a legal IP packet is detected.
Enabled (Strict+All) -
Enable both IPv6 and IPv4 packet checking in strict mode. All packets
are dropped by default until a legal IP packet is detected.
Enabled (Loose+IPv6) -
Enable IPv6 packet checking. All packets are dropped by default until
a legal IP packet is detected.
Enabled (Loose+All) -
Enable both IPv6 and IPv4 packet checking. All packets are dropped by
default until a legal IP packet is detected.
Disabled -
Disable the IPv4 packet checking.
Disabled (IPv6) -
Disable the IPv6 packet checking.
Disabled (All) -
Disable both IPv4 and IPv6 packet checking.
Allow Zero IP
Use the pull-down menu to enable or disable this feature. Once
Enabled
, the Switch will allow
ARP packets with a Source IP of 0.0.0.0 to pass through.
This is useful in some scenarios when a client (for example, a wireless Access Point) sends
out an ARP request packet before accepting the IP address from a DHCP server. In this case,
the ARP request packet sent out from the client will contain a Source IP of 0.0.0.0. The Switch
will need to allow such packets to pass, or else the client cannot know if there is another
duplicate IP address in the network.
Forward DHCP PKT
By default, the Switch will forward all DHCP packets. However, if the port state is set to Strict,
all DHCP packets will be dropped. In that case, select
Enabled
so that the port will forward
DHCP packets even under Strict state. Enabling this feature also ensures that DHCP snooping
works properly.
Mode
ARP
– ARP mode is the default mode that applies to IMPB enabled ports. In ARP mode, if the
Switch identifies the host is legal, the host’s MAC will be programed to
L2 FDB with allowed
;
otherwise the host’s MAC will be programmed to
L2 FDB with drop
. ARP mode for security
access control is based on Layer 2 MAC address.
ACL
– ACL mode provides strict security for IP level traffic. If ACL mode is enabled, the static
configured IMPB entries with ACL mode will be applied to hardware ACL table. If the ACL
mode is disabled, the ACL entries will be removed from the hardware ACL table.
Stop Learning
Threshold (0-500)
Whenever a MAC address is blocked by the Switch, it will be recorded in the Switch’s L2
Forwarding Database (FDB) and associated with a particular port. To prevent the Switch FDB
from overloading in case of an ARP DoS attack, the administrator can configure the threshold
when a port should stop learning illegal MAC addresses.
Enter a Stop Learning threshold between
0
and
500
. Entering 500 means the port will enter the
Stop Learning state after 500 illegal MAC entries and will not allow additional MAC entries,
both legal or illegal, to be learned on this port. In the Stop Learning state, the port will also
automatically purge all blocked MAC entries on this port. Traffic from legal MAC entries are still
forwarded.
Entering
0
means no limit has been set and the port will keep learning illegal MAC addresses.
Recover Learning
Use the Normal check box to recover learning. This feature can only be applied when a port is
already in the Stop Learning state. Tick to recover the port back to normal state, under which
the port will start learning both illegal and legal MAC addresses again.
Max Entry (1-50)
Enter the maximum number of IP-MAC-port binding dynamic entries. By default, the per port
maximum dynamic entry is “No Limit.” The maximum dynamic entry threshold is from
1
to
50
.
Tick the No Limit check box to allow no limit. This setting is only for DHCP snooping for IPv4.
ND snooping and DHCP snooping for IPv6 are not supported.
353