HP 6125XLG R2306-HP 6125XLG Blade Switch Security Configuration Guide - Page 190

Configuring ARP automatic scanning and fixed ARP, Configuration guidelines

Page 190 highlights

[SwitchB-vlan10] arp detection enable # Configure the upstream interface as a trusted interface (an interface is an untrusted interface by default). [SwitchB-vlan10] interface ten-gigabitethernet 1/1/7 [SwitchB-Ten-GigabitEthernet1/1/7] arp detection trust [SwitchB-Ten-GigabitEthernet1/1/7] quit # Configure a static IP source guard binding entry on interface Ten-GigabitEthernet 1/1/6 for user validity check. [SwitchB] interface ten-gigabitethernet 1/1/6 [SwitchB-Ten-GigabitEthernet1/1/6] ip source binding ip-address 10.1.1.6 mac-address 0001-0203-0607 vlan 10 [SwitchB-Ten-GigabitEthernet1/1/6] quit # Enable ARP packet validity check by checking the MAC addresses and IP addresses of ARP packets. [SwitchB] arp detection validate dst-mac ip src-mac After the configurations are completed, ARP packets received on interfaces Ten-GigabitEthernet 1/1/5 and Ten-GigabitEthernet 1/1/6 have their MAC and IP addresses checked first, and then are checked against the static IP source guard binding entries and finally DHCP snooping entries. Configuring ARP automatic scanning and fixed ARP ARP automatic scanning is usually used together with the fixed ARP feature in small-scale networks such as a cybercafe. With ARP automatic scanning enabled on an interface, the device automatically scans neighbors on the interface, sends ARP requests to the neighbors, obtains their MAC addresses, and creates dynamic ARP entries. Fixed ARP allows the device to convert existing dynamic ARP entries (including those generated through ARP automatic scanning) to static ARP entries. The fixed ARP feature prevents ARP entries from being modified by attackers. Static ARP entries can also be manually configured by the arp static command. Configuration guidelines Follow these guidelines when you configure ARP automatic scanning and fixed ARP: • IP addresses existing in ARP entries are not scanned. • ARP automatic scanning may take some time. To stop an ongoing scan, press Ctrl + C. Dynamic ARP entries are created based on ARP replies received before the scan is terminated. • The arp fixup command is a one-time operation and converts existing dynamic ARP entries to static ones. • The device has a limit on the total number of static ARP entries, including the manually configured and the converted. As a result, some dynamic ARP entries may fail the conversion. • To delete a specific static ARP entry converted from a dynamic one, use the undo arp ip-address [ vpn-instance-name ] command. Use the reset arp all command to delete all ARP entries or the reset arp static command to delete all static ARP entries. 181

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276

181
[SwitchB-vlan10] arp detection enable
# Configure the upstream interface as a trusted interface (an interface is an untrusted interface by
default).
[SwitchB-vlan10] interface ten-gigabitethernet 1/1/7
[SwitchB-Ten-GigabitEthernet1/1/7] arp detection trust
[SwitchB-Ten-GigabitEthernet1/1/7] quit
# Configure a static IP source guard binding entry on interface Ten-GigabitEthernet 1/1/6 for user
validity check.
[SwitchB] interface ten-gigabitethernet 1/1/6
[SwitchB-Ten-GigabitEthernet1/1/6] ip source binding ip-address 10.1.1.6 mac-address
0001-0203-0607 vlan 10
[SwitchB-Ten-GigabitEthernet1/1/6] quit
# Enable ARP packet validity check by checking the MAC addresses and IP addresses of ARP
packets.
[SwitchB] arp detection validate dst-mac ip src-mac
After the configurations are completed, ARP packets received on interfaces Ten-GigabitEthernet
1/1/5 and Ten-GigabitEthernet 1/1/6 have their MAC and IP addresses checked first, and then
are checked against the static IP source guard binding entries and finally DHCP snooping entries.
Configuring ARP automatic scanning and fixed ARP
ARP automatic scanning is usually used together with the fixed ARP feature in small-scale networks such
as a cybercafe.
With ARP automatic scanning enabled on an interface, the device automatically scans neighbors on the
interface, sends ARP requests to the neighbors, obtains their MAC addresses, and creates dynamic ARP
entries.
Fixed ARP allows the device to convert existing dynamic ARP entries (including those generated through
ARP automatic scanning) to static ARP entries. The fixed ARP feature prevents ARP entries from being
modified by attackers. Static ARP entries can also be manually configured by the
arp static
command.
Configuration guidelines
Follow these guidelines when you configure ARP automatic scanning and fixed ARP:
IP addresses existing in ARP entries are not scanned.
ARP automatic scanning may take some time. To stop an ongoing scan, press
Ctrl
+
C
. Dynamic
ARP entries are created based on ARP replies received before the scan is terminated.
The
arp fixup
command is a one-time operation and converts existing dynamic ARP entries to static
ones.
The device has a limit on the total number of static ARP entries, including the manually configured
and the converted. As a result, some dynamic ARP entries may fail the conversion.
To delete a specific static ARP entry converted from a dynamic one, use the
undo arp
ip-address
[
vpn-instance-name
] command. Use the
reset arp all
command to delete all ARP entries or the
reset arp static
command to delete all static ARP entries.