HP 5500 Ei 5500 Si Switch Series Configuration Guide
Here you can view all the pages of manual HP 5500 Ei 5500 Si Switch Series Configuration Guide. The HP manuals for Printer are available online for free. You can easily download all the documents as PDF.
Page 2011
346 Total entries found: 1 MAC Address IP Address VLAN Interface Type 0001-0203-0406 192.168.0.1 100 Vlan100 DHCP-RLY\ Static IPv6 source guard configuration example Network requirements As shown in Figure 123 , the host is connected to port GigabitEthernet 1/0/1 of the device. Configure a static IPv6 source guard entry for GigabitEthernet 1/ 0/1 of the device to allow only packets from the host to pass. Figure 123 Network diagram...
Page 2012
347 Enable IPv6 source guard function on the device’s po rt GigabitEthernet 1/0/1 to filter packets based on DHCPv6 snooping entries, allowing only packets from a client that obtains an IP address through the DHCP server to pass. Figure 124 Network diagram Configuration procedure 1. Configure DHCPv6 snooping: # Enable DHCPv6 snooping globally. system-view [Device] ipv6 dhcp snooping enable # Enable DHCPv6 snooping in VLAN 2. [Device] vlan 2 [Device-vlan2] ipv6 dhcp snooping vlan enable...
Page 2013
348 Dynamic IPv6 source guard using ND snooping configuration example Network requirements As shown in Figure 125, the c lient is connected to the device through port GigabitEthernet 1/0/1. Enable ND snooping on the device, establishing ND snooping entries by listening to DAD NS messages. Enable the IPv6 source guard function on port GigabitEthernet 1/0/1 to filter packets based on the ND snooping entries, allowing only packets with a legally obtained IPv6 address to pass. Figure 125 Network...
Page 2014
349 Global static IP source guard configuration example Network requirements As shown in Figure 126 , Device A is a distribution layer device. Device B is an access device. Host A in VLAN 10 and Host B in VLAN 20 communicate with each other through Device A. • Configure Device B to discard attack packets that exploit the IP address or MAC address of Host A and Host B. • Configure Device B to forward packets of Host A and Host B normally. Figure 126 Network diagram Configuration...
Page 2015
350 [DeviceB-GigabitEthernet1/0/2] ip verify source ip-address mac-address [DeviceB-GigabitEthernet1/0/2] quit [DeviceB] interface gigabitethernet 1/0/3 [DeviceB-GigabitEthernet1/0/3] ip verify source ip-address mac-address [DeviceB-GigabitEthernet1/0/3] quit # Configure global static IP binding entries to prevent attack packets that exploit the IP address or MAC address of Host A and Host B from being forwarded. [DeviceB] ip source binding ip-address 192.168.0.2 mac-address 0001-0203\ -0406...
Page 2016
351 Configuring ARP attack protection Only the HP 5500 EI switches support Layer 3 Ethernet port configuration. The term interface in the ARP attack protection features refers to Layer 3 interfaces, including VLAN interfaces and route-mode (or Layer 3) Ethernet ports. You can set an Ethernet port to operate in route mode by using the port link-mode route command (see Layer 2—LAN Switching Configuration Guide ). Overview Although ARP is easy to implement, it provides no security mechanism...
Page 2017
352 Task Remarks Configuring ARP active acknowledgement Optional. Configure this function on gateways (recommended). Configuring ARP detection Optional. Configure this function on access devices (recommended). Configuring ARP automatic scanning and fixed ARP Optional. Configure this function on gateways (recommended). Configuring ARP gateway protection Optional. Configure this function on access devices (recommended). Configuring ARP filtering Optional. Configure this function on...
Page 2018
353 Configuring ARP source suppression Step Command Remarks 1. Enter system view. system-view N/A 2. Enable ARP source suppression. arp source-suppression enable Disabled by default. 3. Set the maximum number of packets with the same source IP address but unresolvable destination IP addresses that the device can receive in five consecutive seconds. arp source-suppression limit limit-value Optional. 10 by default. Enabling ARP black hole routing Step Command Remarks 1. Enter...
Page 2019
354 Figure 127 Network diagram Configuration considerations If the attacking packets have the same source address, you can enable the ARP source suppression function with the following steps: 1. Enable ARP source suppression. 2. Set the threshold for ARP packets from the same source address to 100. If the number of ARP requests sourced from the same IP address in five seconds exceed s 100, the device suppresses the IP packets sourced from this IP address from triggering any ARP requests...
Page 2020
355 Configuring ARP packet rate limit Introduction The ARP packet rate limit feature allows you to limit the rate of ARP packets to be delivered to the CPU on a switch. For example, if an attacker sends a large number of ARP packets to an ARP detection enabled device, the CPU of the device will be overloaded because all of the ARP packets are redirected to the CPU for checking. As a result, the device fails to deliver other functions properly or even crashes. To solve this problem, you can...