No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

Configuration Guide - Security

CloudEngine 8800, 7800, 6800, and 5800 V200R005C10

This document describes the configurations of Security, including ACL, local attack defense, MFF, attack defense, traffic suppression and storm control, ARP security, Port security, DHCP snooping, ND snooping, PPPoE+, IPSG, SAVI, separating the management plane from the service plane, security risks.
Rate and give feedback :
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Configuring a Binding Table

Configuring a Binding Table

Context

IPSG enables the device to check IP packets against the binding table, including dynamic and static entries.

If user IP addresses are dynamically allocated by DHCP, a dynamic binding table is generated after DHCP snooping is enabled. If user IP addresses are configured statically, static binding entries are configured manually.

NOTE:

After a large number of configured binding entries are delivered, you can view the binding entry information only after a period of time.

Procedure

  • For users dynamically obtaining IP addresses through DHCP:

    1. Run system-view

      The system view is displayed.

    2. Run dhcp enable

      DHCP is enabled globally.

      By default, DHCP is disabled globally.

    3. Run dhcp snooping enable

      DHCP snooping is globally enabled.

      By default, DHCP snooping is disabled globally.

    4. Enter the VLAN or interface view.

      • Run vlan vlan-id

        The VLAN view is displayed.

      • Run interface interface-type interface-number

        The interface view is displayed.

    5. Run dhcp snooping enable

      DHCP snooping is enabled in a VLAN or on an interface.

      By default, DHCP snooping is disabled in a VLAN or on an interface.

    6. Configure the trusted interface.

      • Run dhcp snooping trusted interface interface-type interface-number

        The interface in the VLAN is configured as the trusted interface.

      • Run dhcp snooping trusted

        The interface is configured as the trusted interface.

      By default, interfaces are untrusted after DHCP snooping is enabled.

      NOTE:

      The interface directly or indirectly connected to the server is generally configured as the trusted interface. After DHCP snooping is enabled and the trusted interface is configured, the interface on the user side generates dynamic binding entries based on DHCP ACK messages.

    7. Run commit

      The configuration is committed.

  • For users using manually configured IP addresses:

    1. Run system-view

      The system view is displayed.

    2. Run user-bind static { ip-address { start-ip [ to end-ip ] } &<1-10> | mac-address mac-address } * [ interface interface-type interface-number ] [ vlan vlan-id [ inner-vlan inner-vlan-id ] ]

      A static binding entry is configured.

      By default, no static binding table is configured.

    3. Run commit

      The configuration is committed.

Translation
Download
Updated: 2019-04-20

Document ID: EDOC1100074765

Views: 18650

Downloads: 63

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Share
Previous Next