D-Link DGS-1250 Emulator - Page 182

ip arp inspection vlan logging

Page 182 highlights

DGS-1250 Series Gigabit Ethernet Smart Managed Switch CLI Reference Guide Usage Guideline When a VLAN is enabled for ARP inspection, the ARP packets, including both the ARP request and response packet belonging to the VLAN arriving at the untrusted interface will be validated. If the IP-to-MAC address binding pair of the source MAC address and the source IP address is not permitted by the ARP ACL or the DHCP snooping binding database, the ARP packet will be dropped. In addition to the address binding check, the additional check defined by the IP ARP inspection validate command will also be checked. Example This example shows how to enable ARP inspection on VLAN 2. Switch#configure terminal Switch(config)# ip arp inspection vlan 2 Switch(config)# 23-10 ip arp inspection vlan logging This command is used to control the type of packets that are logged. Use the no form of this command to revert to the default settings. ip arp inspection vlan VLAN-ID [, | -] logging {acl-match {permit | all | none} | dhcp-bindings {permit | all | none}} no ip arp inspection vlan VLAN-ID [, | -] logging {acl-match | dhcp-bindings} Parameters VLAN-ID , - acl-match acl-match permit acl-match all acl-match none dhcp-bindings dhcp-bindings permit dhcp-bindings all dhcp-bindings none Specifies the VLAN to enable or disable the logging control function. (Optional) Specifies a series of VLANs or separates a range of VLANs from a previous range. No space is allowed before or after the comma. (Optional) Specifies a range of VLANs. No space is allowed before or after the hyphen. Specifies the logging criteria for packets that are dropped or permitted based on ACL matches. Specifies logging when permitted by the configured ACL. Specifies logging when permitted or denied by the configured ACL. Specifies that ACL-matched packets are not logged. Specifies the logging criteria for packets dropped or permitted based on matches against the DHCP bindings. Specifies logging when permitted by DHCP bindings. Specifies logging when permitted or denied by DHCP bindings. Specifies to prevent the logging of all packets permitted or denied by DHCP bindings. Default All denied or dropped packets are logged. Command Mode Global Configuration Mode. 179

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442
  • 443
  • 444
  • 445
  • 446
  • 447
  • 448
  • 449
  • 450
  • 451
  • 452
  • 453
  • 454
  • 455
  • 456
  • 457
  • 458
  • 459
  • 460
  • 461
  • 462
  • 463
  • 464
  • 465
  • 466
  • 467
  • 468
  • 469
  • 470
  • 471
  • 472
  • 473
  • 474
  • 475
  • 476
  • 477
  • 478
  • 479
  • 480
  • 481
  • 482
  • 483
  • 484
  • 485
  • 486
  • 487
  • 488
  • 489
  • 490
  • 491
  • 492
  • 493
  • 494
  • 495
  • 496
  • 497
  • 498
  • 499
  • 500
  • 501
  • 502
  • 503
  • 504
  • 505
  • 506
  • 507
  • 508
  • 509
  • 510
  • 511
  • 512
  • 513
  • 514
  • 515
  • 516
  • 517
  • 518
  • 519
  • 520
  • 521
  • 522
  • 523
  • 524
  • 525
  • 526
  • 527
  • 528
  • 529
  • 530
  • 531
  • 532
  • 533
  • 534
  • 535
  • 536
  • 537
  • 538
  • 539
  • 540
  • 541
  • 542
  • 543
  • 544
  • 545
  • 546
  • 547
  • 548
  • 549
  • 550
  • 551
  • 552
  • 553
  • 554
  • 555
  • 556
  • 557
  • 558
  • 559

DGS-1250 Series Gigabit Ethernet Smart Managed Switch CLI Reference Guide
179
Usage Guideline
When a VLAN is enabled for ARP inspection, the ARP packets, including both the ARP request and response
packet belonging to the VLAN arriving at the untrusted interface will be validated. If the IP-to-MAC address binding
pair of the source MAC address and the source IP address is not permitted by the ARP ACL or the DHCP
snooping binding database, the ARP packet will be dropped. In addition to the address binding check, the
additional check defined by the IP ARP inspection validate command will also be checked.
Example
This example shows how to enable ARP inspection on VLAN 2.
Switch#configure terminal
Switch(config)# ip arp inspection vlan 2
Switch(config)#
23-10
ip arp inspection vlan logging
This command is used to control the type of packets that are logged. Use the
no
form of this command to revert to
the default settings.
ip arp inspection vlan
VLAN-ID
[, | -] logging {acl-match {permit | all | none} | dhcp-bindings {permit | all |
none}}
no ip arp inspection vlan
VLAN-ID
[, | -] logging {acl-match | dhcp-bindings}
Parameters
VLAN-ID
Specifies the VLAN to enable or disable the logging control function.
,
(Optional) Specifies a series of VLANs or separates a range of VLANs from a
previous range. No space is allowed before or after the comma.
-
(Optional) Specifies a range of VLANs. No space is allowed before or after the
hyphen.
acl-match
Specifies the logging criteria for packets that are dropped or permitted based on
ACL matches.
acl-match permit
Specifies logging when permitted by the configured ACL.
acl-match all
Specifies logging when permitted or denied by the configured ACL.
acl-match none
Specifies that ACL-matched packets are not logged.
dhcp-bindings
Specifies the logging criteria for packets dropped or permitted based on matches
against the DHCP bindings.
dhcp-bindings permit
Specifies logging when permitted by DHCP bindings.
dhcp-bindings all
Specifies logging when permitted or denied by DHCP bindings.
dhcp-bindings none
Specifies to prevent the logging of all packets permitted or denied by DHCP
bindings.
Default
All denied or dropped packets are logged.
Command Mode
Global Configuration Mode.