IPSG based on a dynamic binding table filters IP packets received by untrusted interfaces. This prevents malicious hosts from stealing the IP addresses of authorized hosts to access the network without permission. This function is applicable to a LAN where a large number of hosts reside or the hosts obtain IP addresses through DHCP.
Perform the following operations on the switch to which users connect.
Dynamic binding entries include IPv4 and IPv6 entries. Choose one type of entries according to your network type.
If IPv4 or IPv6 hosts on the network obtain IP addresses through DHCP, DHCP snooping can be configured on the switch to generate DHCP snooping dynamic binding entries for the hosts.
Run the dhcp enable command to enable DHCP.
By default, DHCP is disabled on a switch.
Run the dhcp snooping enable command to enable DHCP snooping globally.
By default, DHCP snooping is disabled globally.
Run the dhcp snooping enable command to enable DHCP snooping in the VLAN or on the interface.
By default, DHCP snooping is disabled in VLANs or on interfaces.
By default, a DHCP snooping-enabled interface is untrusted.
Generally, the interface directly or indirectly connected to the DHCP server is configured as a trusted interface. IPSG forwards the IP packets received by the trusted interface without checking them against the binding entry.
For details about the DHCP snooping configuration, see DHCP Snooping Configuration.
If 802.1X authentication is configured on the network, the switch can generate DHCP snooping dynamic binding entries for the hosts that use static IPv4 or IPv6 addresses.
However, these dynamic entries may not be accurate. To address this issue, configure static binding entries for these hosts.
Run the dhcp enable command to enable DHCP.
By default, DHCP is disabled on a switch.
Run the dhcp snooping enable command to enable DHCP snooping globally.
By default, DHCP snooping is disabled globally.
Run the dhcp snooping enable command to enable DHCP snooping on an interface.
By default, DHCP snooping is disabled on an interface.
Run the dot1x trigger dhcp-binding command (common mode) or dot1x trigger dhcp-binding command (unified mode) to configure the switch to automatically generate DHCP snooping binding entries after hosts using static IP addresses pass 802.1X authentication.
Before performing this configuration in common mode, ensure that 802.1X authentication has been enabled globally and on an interface using the dot1x enable command.
By default, the switch does not generate DHCP snooping binding entries after hosts using static IP addresses pass 802.1X authentication.
For details about the 802.1X authentication configuration, see NAC Configuration (Common Mode) or NAC Configuration (Unified Mode) in the S2720, S5700, and S6700 V200R019C10 Configuration Guide - User Access and Authentication.
Run the nd snooping enable command to enable ND snooping globally.
By default, ND snooping is disabled globally.
Run the nd snooping enable command to enable ND snooping in the VLAN or on the interface.
By default, ND snooping is disabled in VLANs or on interfaces.
By default, an ND snooping-enabled interface is untrusted.
For details about the ND snooping configuration, see Configuring ND Snooping.
Enabling IPSG on an interface: IPSG checks all packets received by the interface against the binding entry. Choose this method if you need to check IP packets on the specified interfaces and trust other interfaces. This method is ideal if an interface belongs to multiple VLANs because you do not need to enable IPSG in each VLAN.
Enabling IPSG in a VLAN: IPSG checks the packets received by all interfaces in the VLAN against the binding entry. Choose this method if you need to check IP packets in the specified VLANs and trust other VLANs. This method is ideal if multiple interfaces belong to the same VLAN because you do not need to enable IPSG on each interface.
By default, IP packet check is disabled on interfaces or in VLANs.
By default, the IP packet check options include IP address, MAC address, VLAN, and interface. Perform this step if some options are trustable or variable (for example, the inbound interface varies in the scenario where packets from hosts may be received by different interfaces). The default values are recommended.
This step is valid only when IPSG is enabled on an interface in Step 2. After this alarm function is configured, the switch generates an alarm if the number of discarded IP packets exceeds the threshold.
Run the system-view command to enter the system view.
Run the interface interface-type interface-number command to enter the interface view.
Run the ip source check user-bind alarm enable command to enable the IP packet check alarm.
By default, IP packet check alarm is disabled.
Run the ip source check user-bind alarm threshold threshold command to set the IP packet check alarm threshold.
By default, the IP packet check alarm threshold is 100.
View the IPSG configuration on an interface.
Run the display ip source check user-bind interface interface-type interface-number command to check the IPSG configuration on the interface.
View the dynamic binding entries and status.