As shown in Figure 1, SwitchA functions as an access device to connect to hosts in an enterprise department. No DHCPv6 server is deployed on the network, and hosts in the department can obtain IPv6 addresses using only SLAAC. If an attacker sends a large number of invalid ND protocol packets or invalid IPv6 data packets, communication of authorized users may be interrupted, and user accounts and passwords may be embezzled. To prevent these problems, the administrator wants to configure SwitchA to defend against invalid ND protocol packets and invalid IPv6 data packets (with invalid source addresses) and provides users with stable services on a secure network.
Configure ND snooping so that bindings between address and ports can be generated for validity of the source addresses in ND protocol packets and IPv6 data packets.
Enable the SAVI function so that the device can check the validity of the source addresses in ND protocol packets based on the ND snooping binding entries and filter out invalid packets.
Enable IP source guard so that the device can check the validity of the source addresses in IPv6 data packets based on the ND snooping binding entries and filter out invalid packets.
<HUAWEI> system-view [HUAWEI] sysname SwitchA [SwitchA] savi enable
[SwitchA] vlan batch 2
[SwitchA] interface gigabitethernet 0/0/1 [SwitchA-GigabitEthernet0/0/1] port link-type access [SwitchA-GigabitEthernet0/0/1] port default vlan 2 [SwitchA-GigabitEthernet0/0/1] quit [SwitchA] interface gigabitethernet 0/0/2 [SwitchA-GigabitEthernet0/0/2] port link-type access [SwitchA-GigabitEthernet0/0/2] port default vlan 2 [SwitchA-GigabitEthernet0/0/2] quit [SwitchA] interface gigabitethernet 0/0/3 [SwitchA-GigabitEthernet0/0/3] port link-type trunk [SwitchA-GigabitEthernet0/0/3] port trunk allow-pass vlan 2 [SwitchA-GigabitEthernet0/0/3] quit
# Enable ND snooping globally.
[SwitchA] nd snooping enable
# Enable ND snooping for VLAN 2.
[SwitchA] vlan 2 [SwitchA-vlan2] nd snooping enable
# Enable validity check for NA and NS packets in VLAN 2.
[SwitchA-vlan2] nd snooping check na enable [SwitchA-vlan2] nd snooping check ns enable [SwitchA-vlan2] quit
# Configure GE0/0/3 connecting to the ND server as a trusted interface.
[SwitchA] interface gigabitethernet 0/0/3 [SwitchA-GigabitEthernet0/0/3] nd snooping trusted [SwitchA-GigabitEthernet0/0/3] quit
[SwitchA] vlan 2 [SwitchA-vlan2] ip source check user-bind enable [SwitchA-vlan2] quit
[SwitchA] display this
...
#
nd snooping enable
savi enable
#
...
[SwitchA] vlan 2
[SwitchA-vlan2] display this # vlan 2 nd snooping enable nd snooping check ns enable nd snooping check na enable ipv4 source check user-bind enable ipv6 source check user-bind enable # return
[SwitchA-vlan2] quit
[SwitchA] interface gigabitethernet 0/0/3
[SwitchA-GigabitEthernet0/0/3] display this # interface GigabitEthernet0/0/3 port link-type trunk port trunk allow-pass vlan 2 nd snooping trusted # return
SwitchA configuration file
# sysname SwitchA # vlan batch 2 # nd snooping enable savi enable # vlan 2 nd snooping enable nd snooping check ns enable nd snooping check na enable ipv4 source check user-bind enable ipv6 source check user-bind enable # interface GigabitEthernet0/0/1 port link-type access port default vlan 2 # interface GigabitEthernet0/0/2 port link-type access port default vlan 2 # interface GigabitEthernet0/0/3 port link-type trunk port trunk allow-pass vlan 2 nd snooping trusted # return