3Com 2928 User Guide - Page 353

Creating a Static Binding Entry, Description, Trusted Ports, <&lt

Page 353 highlights

Item Description Trusted Ports Select trusted ports. To add ports to the Trusted Ports list box, select one or multiple ports from the Untrusted Ports list box and click the > button. User Validation Check Select user validity check modes, including: z Using DHCP Snooping to validate users z Using Dot1x to validate users z Using Static-Binding entries to guard against spoofing gateway attack: You can configure static IP-to-MAC bindings if you select this mode. For the detailed configuration, refer to Creating a Static Binding Entry. If all the detection types are specified, the system uses static IP-to-MAC bindings first, then DHCP snooping entries, and then 802.1X security entries. If an ARP packet fails to pass ARP detection based on static IP-to-MAC bindings, it is discarded. If the packet passes this detection, it will be checked against DHCP snooping entries. If a match is found, the packet is considered to be valid and will not be checked against 802.1X security entries; otherwise, the packet is checked against 802.1X security entries. If a match is found, the packet is considered to be valid; otherwise, the packet is discarded. If none of the above is selected, all ARP packets are considered to be invalid. ARP Packet Validation z Before enabling ARP detection based on DHCP snooping entries, make sure that DHCP snooping is enabled. z Before enabling ARP detection based on 802.1X security entries, make sure that 802.1X is enabled and the 802.1X clients are configured to upload IP addresses. Select ARP packet validity check modes, including: z If the source MAC address of an ARP packet is not identical to that in the Ethernet header, the ARP packet is discarded z If the destination MAC address of an ARP reply is all-zero, all-one, or inconsistent with that in the Ethernet header, the ARP packet is discarded z If the source IP address of an ARP request, or the source IP address or destination IP address of an ARP reply is all-zero, all-one or an multicast IP address, the ARP packet is discarded If none of the above is selected, the system does not check the validity of ARP packets. Creating a Static Binding Entry If you select Using Static-Binding entries to anti fake gateway attack, you can configure static IP-to-MAC binding entries. To create a static binding entry, type an IP address and MAC address in the Static Bindings field, and then click Add, as shown in Figure 2-2. 2-5

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442
  • 443
  • 444
  • 445
  • 446
  • 447
  • 448
  • 449
  • 450
  • 451
  • 452
  • 453
  • 454
  • 455
  • 456
  • 457
  • 458
  • 459
  • 460
  • 461
  • 462
  • 463
  • 464
  • 465
  • 466
  • 467
  • 468
  • 469
  • 470
  • 471
  • 472
  • 473
  • 474
  • 475
  • 476
  • 477
  • 478
  • 479
  • 480
  • 481
  • 482
  • 483
  • 484
  • 485
  • 486
  • 487
  • 488
  • 489
  • 490
  • 491
  • 492
  • 493
  • 494
  • 495
  • 496
  • 497
  • 498
  • 499
  • 500
  • 501
  • 502
  • 503
  • 504
  • 505

2-5
Item
Description
Trusted Ports
Select trusted ports.
To add ports to the
Trusted Ports
list box, select one or multiple ports from the
Untrusted Ports
list box and click the
<<
button.
To remove ports from the
Trusted Ports
list box, select one or multiple ports from
the list box and click the
>>
button.
User Validation
Check
Select user validity check modes, including:
Using DHCP Snooping to validate users
Using Dot1x to validate users
Using Static-Binding entries to guard against spoofing gateway attack: You can
configure static IP-to-MAC bindings if you select this mode. For the detailed
configuration, refer to
Creating a Static Binding Entry
.
If all the detection types are specified, the system uses static IP-to-MAC bindings
first, then DHCP snooping entries, and then 802.1X security entries. If an ARP
packet fails to pass ARP detection based on static IP-to-MAC bindings, it is
discarded. If the packet passes this detection, it will be checked against DHCP
snooping entries. If a match is found, the packet is considered to be valid and will
not be checked against 802.1X security entries; otherwise, the packet is checked
against 802.1X security entries. If a match is found, the packet is considered to be
valid; otherwise, the packet is discarded.
If none of the above is selected, all ARP packets are considered to be invalid.
Before enabling ARP detection based on DHCP snooping entries, make sure
that DHCP snooping is enabled.
Before enabling ARP detection based on 802.1X security entries, make sure
that 802.1X is enabled and the 802.1X clients are configured to upload IP
addresses.
ARP Packet
Validation
Select ARP packet validity check modes, including:
If the source MAC address of an ARP packet is not identical to that in the
Ethernet header, the ARP packet is discarded
If the destination MAC address of an ARP reply is all-zero, all-one, or
inconsistent with that in the Ethernet header, the ARP packet is discarded
If the source IP address of an ARP request, or the source IP address or
destination IP address of an ARP reply is all-zero, all-one or an multicast IP
address, the ARP packet is discarded
If none of the above is selected, the system does not check the validity of ARP
packets.
Creating a Static Binding Entry
If you select
Using Static-Binding entries to anti fake gateway attack
, you can configure static
IP-to-MAC binding entries.
To create a static binding entry, type an IP address and MAC address in the
Static Bindings
field, and
then click
Add
, as shown in
Figure 2-2
.