D-Link DGS-3200-10 Product Manual - Page 137

ACL Mode, Strict and Loose State, DHCP Snooping Option, IP-MAC-Port Binding IMPB, IMPB Global Settings

Page 137 highlights

xStack® DGS-3200 Series Layer 2 Gigabit Ethernet Managed Switch ACL Mode In ACL Mode, a switch performs IP Packet Inspection in addition to ARP Packet Inspection. Essentially, ACL rules will be used to permit statically configured IMPB entries and deny other IP packets with the incorrect IP-MAC pairs. The distinct advantage of ACL Mode is that it ensures better security by ch ecking both ARP Packets and IP Packets. However, doing so requires the use of ACL rules. ACL Mode can be viewed as an enhanced version of ARP Mode because ARP Mode is enabled by default when ACL Mode is selected. Strict and Loose State Other than ACL and ARP mode, users can also configure the state on a port for granular control. There are two states, Strict an d Loose, and only one state can be selected per port. If a port is set to Stric t state, all packet s sent to the port are denied (dropped) by default. The switch will c ontinuously compare all IP a nd ARP packets it receives on that port with its IMPB entries. If the IPMAC pair in the packet matches the IMPB entry, the MAC address will be unblocked and subsequent packets sent from this client will be fo rwarded. On the o ther hand, if a port is set to Loose state, all p ackets sen t to th e port are p ermitted (forward ed) b y default. The switch will c ontinuously compare all ARP packets it receives on that port with its IMPB entries. If the IP-MAC pair in the ARP packet does not match the IMPB wh ite list, the MAC address will b e blocked and subsequent packets sent from this client will be dropped. DHCP Snooping Option If DHCP snooping is enabled, the switch learns IP-MAC pairs by snooping DHCP packets automatically and then saving them to the IP-MAC-Port Binding white list. This enables a hassle-free configuration because the administrator does not need to manually enter each IM PB entry. A prerequisite for t his is that t he valid DHCP server's IP-MAC pair m ust be on the switch's IMPB list; otherwise the DHCP server packets will be dropped. DHCP snooping is gene rally cons idered to be m ore secure because it enforces all clients to acquire IP through the DHCP server. An ex ample o f DH CP sn ooping in which PC-A and PC-B g et th eir I P addresses from a D HCP ser ver is d epicted b elow. The switch snoops the DHCP conversation between PC-A, PC-B, and the DHCP server. The IP address, MAC address, and connecting ports of both PC-A and PC-B are learned and stored in the switch's IMPB white list. Therefore, these PCs will be able to connect to the network. Then there is PC-C, whose IP address is man ually configured by the user. Since this PC's IP-MAC pair does not match the one on Switch's IMPB white list, traffic from PC-C will be blocked. Doesn't match the White List block PC-C IMP Binding Enabled DHCP Server Address Learning White List PC-A 192.168.1.1 00E0-0211-1111 PC-B 192.168.1.2 (IP assigned by DHCP for 00E0-0211-2222 PC-A and PC-B) PC-C 192.168.1.1 00E0-0211-3333 (IP manually configured by user) 192.168.1.1 00E0-0211-111 Port 1 192.168.1.2 00E0-0211-222 Port 2 Figure 5 - 5. Example of DHCP Snooping The IP-MAC-Port Binding (IMPB) folder contains five windows: IMPB Global Settings, IMPB Port Settings, IMPB Entry Settings, DHCP Snooping Entries, and MAC Blocked List. 124

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302

xStack
®
DGS-3200 Series Layer 2 Gigabit Ethernet Managed Switch
124
ACL Mode
In ACL Mode, a switch performs IP Packet Inspection in addition to ARP Packet Inspection. Essentially, ACL rules will be used
to permit statically configured IMPB entries and deny other IP packets with the incorrect IP-MAC pairs. The distinct advantage of
ACL Mode is that it ensures better security by checking both ARP Packets and IP Packets. However, doing so requires the use of
ACL rules. ACL Mode can be viewed as an enhanced version of ARP Mode because ARP Mode is enabled by default when ACL
Mode is selected
.
Strict and Loose State
Other than ACL and ARP mode, users can also configure the state on a port for granular control. There are two states, Strict an d
Loose, and only one state can be selected per port.
If a port is set to Strict state, all packets sent to the port are denied (dropped)
by default. The switch will continuously compare all IP and ARP packets it receives on that port with its IMPB entries. If the IP-
MAC pair in the packet matches the IMPB entry, the MAC address will be unblocked and subsequent packets sent from this client
will be fo rwarded. On the o ther hand, if a port is set to Loose state, all p ackets sen t to th e port are p ermitted (forward ed) b y
default. The switch will continuously compare all ARP packets it receives on that port with its IMPB entries. If the IP-MAC pair
in the ARP packet does not match the IMPB white list, the MAC address will be blocked and subsequent packets sent from this
client will be dropped.
DHCP Snooping Option
If DHCP snooping is enabled, the switch learns IP-MAC pairs by snooping DHCP packets automatically and then saving them to
the IP-MAC-Port Binding white list. This enables a hassle-free configuration because the administrator does not need to manually
enter each IMPB entry. A prerequisite for this is that the valid DHCP server’s IP-MAC pair must be on the switch’s IMPB list;
otherwise the DHCP server packets will
be dropped. DHCP snooping is gene
rally cons idered to be m ore secure because it
enforces all clients to acquire IP through the DHCP server.
An ex ample o f DH CP sn ooping in which PC-A and PC-B g et th eir I P addresses from a D HCP ser ver is d epicted b elow. The
switch snoops the DHCP conversation between PC-A, PC-B, and the DHCP server. The IP address, MAC address, and connecting
ports of both PC-A and PC-B are learned and stored in the switch’s IMPB white list. Therefore, these PCs will be able to connect
to the network. Then there is PC-C, whose IP address is manually configured by the user. Since this PC’s IP-MAC pair does not
match the one on Switch’s IMPB white list, traffic from PC-C will be blocked.
PC-A
192.168.1.1
00E0-0211-111
Port 1
192.168.1.2
00E0-0211-222
Port 2
Figure 5 - 5. Example of DHCP Snooping
The
IP-MAC-Port Binding (IMPB)
folder contains five windows:
IMPB Global Settings
,
IMPB Port Settings
,
IMPB Entry
Settings
,
DHCP Snooping Entries
, and
MAC Blocked List
.
IMP Binding Enabled
Address Learning
White List
(IP assigned by DHCP for
PC-A and PC-B)
192.168.1.2
00E0-0211-2222
192.168.1.1
00E0-0211-3333
(IP manually configured by user)
DHCP Server
PC-B
PC-C
Doesn’t match the
White List block PC-C
192.168.1.1
00E0-0211-1111