D-Link DGS-3426P Product Manual - Page 294

IMPB Entry Settings, Allow Zero IP, Forward DHCP PKT, Stop Learning, Threshold 0-500, Recover Learning

Page 294 highlights

xStack® DGS-3400 Series Layer 2 Gigabit Ethernet Managed Switch packets. An example of this is that a malicious user can perform DoS attacks by statically configuring the ARP table on their PC. In this case, the Switch cannot block such attacks because the PC will not send out ARP packets. Allow Zero IP Use the pull-down menu to enable or disable this feature. Once enabled, the Switch will allow ARP packets with a Source IP of 0.0.0.0 to pass through. This is useful in some scenarios when a client (for example, a wireless Access Point,) sends out an ARP request packet before accepting the IP address from a DHCP server. In this case, the ARP request packet sent out from the client will contain a Source IP of 0.0.0.0. The Switch will need to allow such packets to pass, or else the client cannot know if there is another duplicate IP address in the network. Forward DHCP PKT By default, the Switch will forward all DHCP packets. However, if the port state is set to Strict, all DHCP packets will be dropped. In that case, select Enable so that the port will forward DHCP packets even under Strict state. Enabling this feature also ensures that DHCP snooping works properly. Mode Use the pull-down menu to select ARP or ACL mode. ARP Mode - When selecting this mode, the Switch will perform ARP Packet Inspection only and no ACL rules will be used. ACL Mode - When selecting this mode, the Switch will perform IP Packet Inspection in addition to ARP Packet Inspection. ACL rules will be used under this mode. Stop Learning Threshold (0-500) Whenever a MAC address is blocked by the Switch, it will be recorded in the Switch's L2 Forwarding Database (FDB) and associated with a particular port. To prevent the Switch FDB from overloading in case of an ARP DoS attack, the administrator can configure the threshold when a port should stop learning illegal MAC addresses. Enter a Stop Learning threshold between 0 and 500. Entering 500 means the port will enter the Stop Learning state after 500 illegal MAC entries and will not allow additional MAC entries, both legal or illegal, to be learned on this port. In the Stop Learning state, the port will also automatically purge all blocked MAC entries on this port. Traffic from legal MAC entries are still forwarded. Entering 0 means no limit has been set and the port will keep learning illegal MAC addresses. Recover Learning This feature can only be applied when a port is already in Stop Learning state. Check Normal to recover the port back to normal state, under which the port will start learning both illegal and legal MAC addresses again. Selecting this feature when the port is in Normal state will do nothing. Max Entry (1-50) Specifies the maximum number of dynamic (DHCP snooped) IP-MAC-Port Binding entries that can be learned on the port. Enter a value between 1 to 50 to restrict dynamic IMPB entries on this port. By default, the-per port max entry has No Limit. Click Apply to implement the changes. IMPB Entry Settings The table on this window, which is also known as the "IMPB white list," is used to create Static IP-MAC-Port Binding entries on the Switch. To view this window, click Security > IP-MAC-Port Binding > IMPB Entry Settings, as shown below. 285

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424

xStack
®
DGS-3400 Series Layer 2 Gigabit Ethernet Managed Switch
285
packets. An example of this is that a malicious user can perform DoS attacks by statically
configuring the ARP table on their PC. In this case, the Switch cannot block such attacks
because the PC will not send out ARP packets.
Allow Zero IP
Use the pull-down menu to enable or disable this feature. Once enabled, the Switch will allow
ARP packets with a Source IP of 0.0.0.0 to pass through.
This is useful in some scenarios when a client (for example, a wireless Access Point,) sends
out an ARP request packet before accepting the IP address from a DHCP server. In this case,
the ARP request packet sent out from the client will contain a Source IP of 0.0.0.0. The Switch
will need to allow such packets to pass, or else the client cannot know if there is another
duplicate IP address in the network.
Forward DHCP PKT
By default, the Switch will forward all DHCP packets. However, if the port state is set to Strict,
all DHCP packets will be dropped. In that case, select
Enable
so that the port will forward
DHCP packets even under Strict state. Enabling this feature also ensures that DHCP snooping
works properly.
Mode
Use the pull-down menu to select ARP or ACL mode.
ARP Mode
– When selecting this mode, the Switch will perform ARP Packet Inspection only
and no ACL rules will be used.
ACL Mode
– When selecting this mode, the Switch will perform IP Packet Inspection in
addition to ARP Packet Inspection. ACL rules will be used under this mode.
Stop Learning
Threshold (0-500)
Whenever a MAC address is blocked by the Switch, it will be recorded in the Switch’s L2
Forwarding Database (FDB) and associated with a particular port. To prevent the Switch FDB
from overloading in case of an ARP DoS attack, the administrator can configure the threshold
when a port should stop learning illegal MAC addresses.
Enter a Stop Learning threshold between
0
and
500
. Entering 500 means the port will enter the
Stop Learning state after 500 illegal MAC entries and will not allow additional MAC entries,
both legal or illegal, to be learned on this port. In the Stop Learning state, the port will also
automatically purge all blocked MAC entries on this port. Traffic from legal MAC entries are still
forwarded.
Entering
0
means no limit has been set and the port will keep learning illegal MAC addresses.
Recover Learning
This feature can only be applied when a port is already in Stop Learning state. Check
Normal
to recover the port back to normal state, under which the port will start learning both illegal and
legal MAC addresses again.
Selecting this feature when the port is in Normal state will do nothing.
Max Entry (1-50)
Specifies the maximum number of dynamic (DHCP snooped) IP-MAC-Port Binding entries that
can be learned on the port. Enter a value between
1
to
50
to restrict dynamic IMPB entries on
this port.
By default, the-per port max entry has No Limit.
Click
Apply
to implement the changes.
IMPB Entry Settings
The table on this window, which is also known as the “IMPB white list,” is used to create Static IP-MAC-Port Binding entries on
the Switch.
To view this window, click
Security > IP-MAC-Port Binding > IMPB Entry Settings
, as shown below.