HP 6125XLG R2306-HP 6125XLG Blade Switch Security Configuration Guide - Page 174

Displaying and maintaining IP source guard, Static IPv4 source guard configuration example, Network

Page 174 highlights

Step 3. Configure a static IPv6 binding entry. Command ipv6 source binding ip-address ipv6-address [ mac-address mac-address ] [ vlan vlan-id ] Remarks By default, no static IPv6 binding entry is configured on an interface. IP source guard does not use the VLAN information (if specified) in static IPv6 source guard binding entries to filter packets. You do not need to specify the VLAN information for packet filtering. The vlan vlan-id option is supported in only Ethernet interface view. NOTE: You cannot configure the same static binding entry on one interface multiple times, but you can configure the same static binding entry on different interfaces. Displaying and maintaining IP source guard Execute display commands in any view and reset commands in user view. For IPv4 source guard: Task Display IPv4 binding entries. Clear IPv4 biding entries. Command display ip source binding [ static | [ vpn-instance vpn-instance-name ] [ dhcp-relay | dhcp-server | dhcp-snooping ] ] [ ip-address ip-address ] [ mac-address mac-address ] [ vlan vlan-id ] [ interface interface-type interface-number ] [ slot slot-number ] reset ip source binding [ static [ ip-address ip-address ] | [ vpn-instance vpn-instance-name ] [ { dhcp-relay | dhcp-server | dhcp-snooping } [ ip-address ip-address ] ] ] For IPv6 source guard: Task Display static IPv6 binding entries. Clear IPv6 biding entries. Command display ipv6 source binding static [ ip-address ipv6-address ] [ mac-address mac-address ] [ vlan vlan-id ] [ interface interface-type interface-number ] [ slot slot-number ] reset ipv6 source binding [ static [ ip-address ipv6-address ] ] Static IPv4 source guard configuration example Network requirements All hosts use static IP addresses. Configure static IPv4 source guard binding entries on Switch A and Switch B to meet the following requirements: • On port Ten-GigabitEthernet 1/1/6 of Switch A, only IP packets from Host C can pass. 165

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276

165
Step
Command
Remarks
3.
Configure a static IPv6
binding entry.
ipv6 source binding
ip-address
ipv6-address
[
mac-address
mac-address
] [
vlan
vlan-id
]
By default, no static IPv6 binding entry is
configured on an interface.
IP source guard does not use the VLAN
information (if specified) in static IPv6
source guard binding entries to filter
packets. You do not need to specify the
VLAN information for packet filtering.
The
vlan
vlan-id
option is supported in only
Ethernet interface view.
NOTE:
You cannot configure the same static binding entry on one interface multiple times, but you can configure
the same static binding entry on different interfaces.
Displaying and maintaining IP source guard
Execute
display
commands in any view and
reset
commands in user view.
For IPv4 source guard:
Task
Command
Display IPv4 binding
entries.
display ip source binding
[
static
| [
vpn-instance
vpn-instance-name
]
[
dhcp-relay
|
dhcp-server
|
dhcp-snooping
] ]
[
ip-address
ip-address
]
[
mac-address
mac-address
] [
vlan
vlan-id
] [
interface
interface-type
interface-number
] [
slot
slot-number
]
Clear IPv4 biding entries.
reset ip source binding
[
static
[
ip-address
ip-address
] | [
vpn-instance
vpn-instance-name
] [ {
dhcp-relay
|
dhcp-server
|
dhcp-snooping
} [
ip-address
ip-address
] ] ]
For IPv6 source guard:
Task
Command
Display static IPv6 binding
entries.
display ipv6 source binding static
[
ip-address
ipv6-address
] [
mac-address
mac-address
] [
vlan
vlan-id
] [
interface
interface-type interface-number
] [
slot
slot-number
]
Clear IPv6 biding entries.
reset ipv6 source binding
[
static
[
ip-address
ipv6-address
] ]
Static IPv4 source guard configuration example
Network requirements
All hosts use static IP addresses.
Configure static IPv4 source guard binding entries on Switch A and Switch B to meet the following
requirements:
On port Ten-GigabitEthernet 1/1/6 of Switch A, only IP packets from Host C can pass.