Home > HP > Switch > HP A 5120 Manual

HP A 5120 Manual

    Download as PDF Print this page Share this page

    Have a look at the manual HP A 5120 Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 1114 HP manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							 
    281 
    The  port  checks  the  sender  IP  and  MAC addresses  in  a  received  ARP  packet  against  configured  ARP 
    filtering entries. If a match is found, the packet is handled normally. If not, the packet is discarded. 
    Configuration procedure 
    Follow these steps to configure ARP filtering: 
    To do… Use the command… Remarks 
    Enter system view system-view — 
    Enter Layer 2 Ethernet port 
    view/Layer 2 aggregate interface 
    view  
    interface interface-type interface-
    number — 
    Configure an ARP filtering entry arp filter binding ip-address mac-
    address 
    Required 
    Not configured by default. 
     
     NOTE: 
     You can configure up to eight ARP filtering entries on a port. 
     Commands arp filter source and arp filter binding cannot be both configured on a port. 
     If ARP filtering works with ARP detection, ARP filtering applies first.  
    ARP filtering configuration example 
    Network requirements 
    As  shown  in Figure  88, the IP  and  MAC  addresses  of  Host  A  are 10.1.1.2 and 000f-e349-1233 
    respectively. The IP and MAC addresses of Host B are 10.1.1.3 and 000f-e349-1234, respectively. 
    Configure  ARP  filtering  on GigabitEthernet 1/0/1 and GigabitEthernet 1/0/2  of  Switch  B  to permit 
    specific ARP packets only.  
    Figure 88 Network diagram for ARP filtering configuration 
     
     
    Configuration procedure 
    # Configure ARP filtering on Switch B.   Switch A
    Switch B
    Host AHost B
    GE1/0/1
    GE1/0/3
    GE1/0/2   
    						
    							 
    282 
     system-view 
    [SwitchB] interface GigabitEthernet 1/0/1 
    [SwitchB-GigabitEthernet1/0/1] arp filter binding 10.1.1.2 000f-e349-1233 
    [SwitchB-GigabitEthernet1/0/1] quit 
    [SwitchB] interface GigabitEthernet 1/0/2 
    [SwitchB-GigabitEthernet1/0/2] arp filter binding 10.1.1.3 000f-e349-1234 
    After the configuration is complete, GigabitEthernet 1/0/1 will permit incoming ARP packets with sender 
    IP and MAC addresses as 10.1.1.2 and 000f-e349-1233, and discard other ARP packets. GigabitEthernet 
    1/0/2 will permit  incoming  ARP  packets  with  sender  IP and MAC  addresses as 10.1.1.3  and 000f-e349-
    1234 and discard other ARP packets.  
    						
    							 
    283 
    ND attack defense configuration 
    Introduction to ND attack defense  
    The  IPv6  Neighbor  Discovery  (ND)  protocol  provides  rich  functions, such  as  address  resolution,  neighbor 
    reachability  detection,  duplicate  address  detection,  router/prefix  discovery  and  address 
    autoconfiguration,  and  redirection.  However,  it  does  not  provide  any  security  mechanisms. Attackers  can 
    easily exploit the ND protocol to attack hosts and gateways by sending forged packets.  
    The ND protocol implements its function by using the following types of ICMPv6 messages:  
     Neighbor Solicitation (NS) 
     Neighbor Advertisement (NA)  
     Router Solicitation (RS)  
     Router Advertisement (RA)  
     Redirect (RR) 
    An attacker can attack a network by sending forged ICMPv6 messages, as shown in Figure 89: 
     Sends  forged  NS/NA/RS  packets  with  the  IPv6  address  of  a  victim  host.  The  gateway  and  other 
    hosts  update  the  ND  entry  for  the  victim  host  with  incorrect  address  information.  As  a  result,  all 
    packets intended for the victim host are sent to the attacking host rather than the victim host.  
     Sends forged RA packets with the IPv6 address of a victim gateway. As a result, all hosts attached to 
    the victim gateway maintain incorrect IPv6 configuration parameters and ND entries.  
    Figure 89  ND attack diagram  
     
     
    All forged ND packets have two common features:  
     The  Ethernet  frame  header  and  the  source  link  layer address option  of  the  ND  packet  contain 
    different source MAC addresses.   Switch
    Host A
    Host B
    IP_AMAC_A
    IP_BMAC_B
    IP_CMAC_C
    Host C
    Forged ND packetsForged ND packets  
    						
    							 
    284 
     The  mapping  between  the  source  IPv6  address  and  the  source  MAC  address  in  the  Ethernet  frame 
    header is invalid.  
    To  identify  forged  ND  packets, HP developed  the  source  MAC  consistency  check  and  ND  detection 
    features.   
     NOTE: 
    For more information about the functions of the ND protocol, see the Layer 3—IP Services 
    Configuration Guide.  
    Enabling source MAC consistency check for ND 
    packets 
    Use source MAC consistency check on a gateway to filter out ND packets that carry different source MAC 
    addresses in the Ethernet frame header and the source link layer address option.  
    Follow these steps to enable source MAC consistency check for ND packets: 
    To do… Use the command… Remarks 
    Enter system view system-view — 
    Enable source MAC consistency check for 
    ND packets ipv6 nd mac-check enable Required 
    Disabled by default. 
     
    Configuring the ND detection function 
    Introduction to ND detection 
    Use  the  ND  detection  function  on  access  devices  to verify  the  source  of  ND  packets.  If  an  ND  packet 
    comes from a spoofing host or gateway, it is discarded.  
    The  ND  detection  function  operates  on  a  per  VLAN  basis.  In  an  ND  detection-enabled  VLAN,  a  port  is 
    either ND-trusted or ND-untrusted:  
     An ND-trusted port does not check ND packets for address spoofing.  
     An  ND-untrusted  port  checks  all  ND  packets  but  RA  and  RR  messages  in  the  VLAN  for  source 
    spoofing. RA and RR messages are considered illegal and are discarded directly.  
    The  ND  detection  function  checks an  ND  packet  by  looking  up  the  IPv6  static  bindings  table  of  the  IP 
    source guard function, ND snooping table, and DHCPv6 snooping table in the following steps:  
    1. Looks up the IPv6 static bindings table of IP source guard, based on the source IPv6 address and 
    the source MAC address in the Ethernet frame header of the ND packet. If an exact match is found, 
    the ND packet is forwarded. If an entry matches the source IPv6 address but not the source MAC 
    address, the ND packet is discarded. If no entry matches the source IPv6 address, the ND detection 
    function continues to look up the DHCPv6 snooping table and the ND snooping table.  
    2. If an exact match is found in either the DHCPv6 snooping or ND snooping table, the ND packet is 
    forwarded. If no match is found in either table, the packet is discarded. If neither the DHCPv6 
    snooping table nor the ND snooping table is available, the ND packet is discarded.   
    						
    							 
    285 
     NOTE: 
     To create IPv6 static bindings with IP source guard, use the user-bind ipv6 command. For more information, see 
    the chapter “IP source guard configuration.”  
     The DHCPv6 snooping table is created automatically by the DHCPv6 snooping module. For more information, 
    see the Layer 3—IP Services Configuration Guide.  
     The ND snooping table is created automatically by the ND snooping module. For more information, see the 
    Layer 3—IP Services Configuration Guide.  
    Configuring ND detection 
    Follow these steps to configure ND detection: 
    To do… Use the command… Remarks  
    Enter system view system-view –– 
    Enter VLAN view vlan vlan-id –– 
    Enable ND Detection ipv6 nd detection enable Required 
    Disabled by default.  
    Quit system view quit –– 
    Enter Layer 2 Ethernet interface view 
    or Layer 2 aggregate interface view 
    interface interface-type interface-
    number –– 
    Configure the port as an ND-trusted 
    port ipv6 nd detection trust 
    Optional 
    A port does not trust sources 
    of ND packets by default. 
     
     NOTE: 
     ND detection performs source check by using the binding tables of IP source guard, DHCPv6 snooping, and ND 
    snooping. To prevent an ND-untrusted port from discarding legal ND packets in an ND detection-enabled 
    VLAN, ensure that at least one of the three functions is available. 
     When creating an IPv6 static binding with IP source guard for ND detection in a VLAN, specify the VLAN ID for 
    the binding. If not, no ND packets in the VLAN can match the binding.  
    Displaying and maintaining ND detection 
    To do… Use the command  Remarks 
    Display the ND detection 
    configuration 
    display ipv6 nd detection [ | { begin | exclude 
    | include } regular-expression ]  Available in any view 
    Display the statistics of 
    discarded packets when the ND 
    detection checks the user 
    legality 
    display ipv6 nd detection statistics [ interface 
    interface-type interface-number ] [ | { begin | 
    exclude | include } regular-expression ] 
    Available in any view 
    Clear the statistics by ND 
    detection 
    reset ipv6 nd detection statistics [ interface 
    interface-type interface-number ] Available in user view 
      
    						
    							 
    286 
    ND detection configuration example 
    Network requirements  
    As  shown  in Figure  90,  Host  A  and  Host  B  connect  to  Switch  A,  the  gateway,  through  Switch  B.  Host  A 
    has  the  IPv6  address  10::5  and  MAC  address  0001-0203-0405.  Host  B  has  the  IPv6  address 10::6  and 
    MAC address 0001-0203-0607.  
    Enable ND detection on Switch B to filter out forged ND packets.  
    Figure 90 Network diagram for ND detection configuration 
     
     
    Configuration procedure 
    1. Configuring Switch A  
    # Enable IPv6 forwarding. 
     system-view 
    [SwitchA] ipv6 
    # Create VLAN 10. 
    [SwitchA] vlan 10 
    [SwitchA-vlan10] quit 
    # Assign port GigabitEthernet 1/0/3 to VLAN 10. 
    [SwitchA] interface GigabitEthernet 1/0/3 
    [SwitchA-GigabitEthernet1/0/3] port link-type trunk 
    [SwitchA-GigabitEthernet1/0/3] port trunk permit vlan 10 
    [SwitchA-GigabitEthernet1/0/3] quit 
    # Assign an IPv6 address to VLAN-interface 10. 
    [SwitchA] interface vlan-interface 10 
    [SwitchA-Vlan-interface10] ipv6 address 10::1/64  10::50001-0203-0405
    Switch A
    Switch B
    Host AHost B
    GE1/0/3Vlan-int10 10::1
    Gateway
    GE1/0/1
    GE1/0/3
    GE1/0/2
    VLAN 10ND snooping
    10::60001-0203-0607
    Internet   
    						
    							 
    287 
    [SwitchA-Vlan-interface10] quit 
    2. Configuring Switch B 
    # Enable IPv6 forwarding. 
     system-view 
    [SwitchB] ipv6 
    # Create VLAN 10. 
    [SwitchB] vlan 10 
    [SwitchB-vlan10] quit 
    # Assign ports GigabitEthernet 1/0/1 to GigabitEthernet 1/0/3 to VLAN 10. 
    [SwitchB] interface GigabitEthernet 1/0/1 
    [SwitchB-GigabitEthernet1/0/1] port link-type trunk 
    [SwitchB-GigabitEthernet1/0/1] port trunk permit vlan 10 
    [SwitchB-GigabitEthernet1/0/1] quit 
    [SwitchB] interface GigabitEthernet 1/0/2 
    [SwitchB-GigabitEthernet1/0/2] port link-type trunk 
    [SwitchB-GigabitEthernet1/0/2] port trunk permit vlan 10 
    [SwitchB-GigabitEthernet1/0/2] quit 
    [SwitchB] interface GigabitEthernet 1/0/3 
    [SwitchB-GigabitEthernet1/0/3] port link-type trunk 
    [SwitchB-GigabitEthernet1/0/3] port trunk permit vlan 10 
    [SwitchB-GigabitEthernet1/0/3] quit 
    # Enable ND snooping in VLAN 10.  
    [SwitchB] vlan 10 
    [SwitchB-vlan 10] ipv6 nd snooping enable 
    # Enable ND detection in VLAN 10.  
    [SwitchB-vlan 10] ipv6 nd detection enable 
    [SwitchB-vlan 10] quit 
    #  Configure  the  uplink port  GigabitEthernet 1/0/3  as  an  ND-trusted  port,  and  the  downlink  ports 
    GigabitEthernet 1/0/1 and GigabitEthernet 1/0/2 as ND-untrusted ports (the default).  
    [SwitchB] interface GigabitEthernet 1/0/3 
    [SwitchB-GigabitEthernet 1/0/3] ipv6 nd detection trust 
    The  configuration  enables  Switch  B  to  check  all  incoming  ND  packets  of  ports  GigabitEthernet  1/0/1 
    and GigabitEthernet 1/0/2 based on the ND snooping table.  
      
    						
    							 
    288 
    Support and other resources 
    Contacting HP 
    For worldwide technical support information, see the HP support website: 
    http://www.hp.com/support 
    Before contacting HP, collect the following information: 
     Product model names and numbers 
     Technical support registration number (if applicable) 
     Product serial numbers 
     Error messages 
     Operating system type and revision level 
     Detailed questions 
    Subscription service 
    HP recommends that you register your product at the Subscribers Choice for Business website: 
    http://www.hp.com/go/wwalerts 
    After  registering,  you  will  receive  email  notification  of  product  enhancements,  new  driver  versions, 
    firmware updates, and other product resources. 
    Related information 
    Documents 
    To find related documents, browse to the Manuals page of the HP Business Support Center website: 
    http://www.hp.com/support/manuals 
     For related documentation, navigate to the Networking section, and select a networking category. 
     For a complete list of acronyms and their definitions, see HP A-Series Acronyms. 
    Websites  
     HP.com http://www.hp.com 
     HP Networking http://www.hp.com/go/networking 
     HP manuals http://www.hp.com/support/manuals 
     HP download drivers and software http://www.hp.com/support/downloads 
     HP software depot http://www.software.hp.com  
    						
    							 
    289 
    Conventions 
    This section describes the conventions used in this documentation set. 
    Command conventions 
    Convention Description 
    Boldface Bold text represents commands and keywords that you enter literally as shown. 
    Italic Italic text represents arguments that you replace with actual values. 
    [ ] Square brackets enclose syntax choices (keywords or arguments) that are optional. 
    { x | y | ... } Braces enclose a set of required syntax choices separated by vertical bars, from which 
    you select one.  
    [ x | y | ... ] Square brackets enclose a set of optional syntax choices separated by vertical bars, 
    from which you select one or none.  
    { x | y | ... } * Asterisk-marked braces enclose a set of required syntax choices separated by vertical 
    bars, from which you select at least one. 
    [ x | y | ... ] * Asterisk-marked square brackets enclose optional syntax choices separated by vertical 
    bars, from which you select one choice, multiple choices, or none.  
    & The argument or keyword and argument combination before the ampersand (&) sign 
    can be entered 1 to n times. 
    # A line that starts with a pound (#) sign is comments. 
     
    GUI conventions 
    Convention Description 
    Boldface Window names, button names, field names, and menu items are in bold text. For 
    example, the New User window appears; click OK. 
    > Multi-level menus are separated by angle brackets. For example, File > Create > 
    Folder. 
     
    Symbols 
    Convention Description 
     WARNING An alert that calls attention to important information that if not understood or followed 
    can result in personal injury. 
     CAUTION An alert that calls attention to important information that if not understood or followed 
    can result in data loss, data corruption, or damage to hardware or software.  
     IMPORTANT An alert that calls attention to essential information. 
    NOTE An alert that contains additional or supplementary information. 
     TIP An alert that provides helpful information. 
          
    						
    							 
    290 
    Network topology icons 
     Represents a generic network device, such as a router, switch, or firewall. 
     Represents a routing-capable device, such as a router or Layer 3 switch. 
     
    Represents a generic switch, such as a Layer 2 or Layer 3 switch, or a router that 
    supports Layer 2 forwarding and other Layer 2 features. 
     
    Port numbering in examples 
    The port numbers in this document are for illustration only and might be unavailable on your device.     
    						
    All HP manuals Comments (0)

    Related Manuals for HP A 5120 Manual