Home > HP > Printer > HP 5500 Ei 5500 Si Switch Series Configuration Guide

HP 5500 Ei 5500 Si Switch Series Configuration Guide

    Download as PDF Print this page Share this page

    Have a look at the manual HP 5500 Ei 5500 Si Switch Series Configuration Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 1114 HP manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    Page
    of 2513
    							 336 
    Configuring the IPv4 source guard function 
    You cannot enable IPv4 source guard on a link a ggregation member port or a service loopback group. 
    If IPv4 source guard is enabled on a port, you cannot  assign the port to a link aggregation group or a 
    service loopback group. 
    Configuring IPv4 source guard on a port 
    The IPv4 source guard function must be configured on a port before the port can obtain dynamic IPv4 
    source guard entries and use static and dynamic IPv4 source guard entries to filter packets. 
    •   For how to configure a static binding entry, see  Configuring a static IPv4 source guard entry. 
    •   On a L
    
    ayer 2 Ethernet port, IP source guard coop erates with DHCP snooping, dynamically obtains 
    the DHCP snooping entries generated during dynamic IP address allocation, and generates IP 
    source guard entries accordingly.  
    •   O n  a  V L A N  i n t e r f a c e,  I P  s o u rc e  g u a rd  c o o p e ra t e s  wi t h  D H C P  re l ay,  dyn a m i c a l l y  o b t a i n s  t h e  D H C P  
    relay entries generated during dynamic IP address allocation across network segments, and 
    generates IP source guard entries accordingly. 
    Dynamic IPv4 source guard entries can contain such information as the MAC address, IP address, VLAN 
    tag, ingress port information, and entry type (DHCP snooping or DHCP relay), where the MAC address, 
    IP address, or VLAN tag information may not be included depending on your configuration. IP source 
    guard applies these entries to the port to filter packets. 
    To  g e n e r a t e  I P v 4  b i n d i n g  e n t r i e s  d yn a m i c a l l y  b a s e d  o n  D H C P  e n t r i e s ,  m a ke  s u re  t h a t  D H C P  s n o o p i n g  o r  
    DHCP relay is configured and working normally. For information about DHCP snooping configuration 
    and DHCP relay configuration, see  Layer 3—IP Services Configuration Guide . 
    If you repeatedly configure the IPv4 source guard function on a port, only the last configuration takes 
    effect. 
    To configure the IPv4 source guard function on a port: 
     
    Step Command Remarks 
    1.   Enter system view. 
    system-view  N/A 
    2.  Enter interface view.   interface
     interface-type 
    interface-number   The term interface
     collectively 
    refers to the following types of 
    ports and interfaces: Bridge mode 
    (Layer 2) Ethernet ports, VLAN 
    interfaces, and port groups.  
    3.   Configure IPv4 source guard 
    on the port.  ip verify source 
    { ip-address  | 
    ip-address  mac-address  | 
    mac-address  }  Not configured by default. 
     
     
    NOTE: 
    Although dynamic IPv4 source guard entries are genera ted based on DHCP entries, the number of 
    dynamic IPv4 source guard entries is not necessa rily the same as that of the DHCP entries. 
      
    						
    							 337 
    Configuring a static IPv4 source guard entry 
    Static IPv4 binding entries take effect only on the ports configured with the IPv4 source guard function 
    (see  Configuring IPv4 source guard on a port )
     . 
    Port-based static IPv4 source guard entries and dyna mic IPv4 source guard entries take precedence over 
    global static IPv4 source guard entries. A port matc hes a packet against global static binding entries only 
    when the packet does not match any port-based static binding entry or dynamic binding entry on the 
    port. 
    Configuring global static IPv4 binding entries 
    A global static binding entry defines the IP address and MAC address of the packets that can be 
    forwarded by ports. It takes effect on all ports of the device. 
    To configure a global static IPv4 binding entry: 
     
    Step Command Remarks 
    1.   Enter system view. 
    system-view  N/A 
    2.  Configure a global static IPv4 
    binding entry.  ip source binding ip-address
     
    ip-address mac-address  
    mac-address
     
    No glob a l sta ti c IP v4  b ind ing entry  
    is configured by default. 
     
    Configuring port-based static IPv4 binding entries 
    Follow these guidelines to configure port-b ased static IPv4 source guard entries: 
    •   You cannot repeatedly configure the same static binding entry on one port, but you can configure 
    the same static entry on different ports. 
    •   IP source guard does not use the VLAN information (if specified) in static IPv4 binding entries to 
    filter packets. 
    •   When the ARP detection function is configured, be sure to specify the VLAN where ARP detection 
    is configured in static IPv4 binding entries. Otherwise, ARP packets are discarded because they 
    cannot match any static IPv4 binding entry. 
    •   If a static binding entry to be added denotes the sa me binding as an existing dynamic binding entry, 
    the new static binding entry overwrites the dynamic binding entry. 
    To configure a static IPv4 binding entry on a port: 
     
    Step Command Remarks 
    1.   Enter system view. 
    system-view  N/A 
    2.  Enter Layer 2 interface view.  interface 
    interface-type  
    interface-number N/A 
    3.   Configure a static IPv4 source 
    guard entry on the port.  ip source binding 
    { ip-address  
    ip-address |  ip-address ip-address  
    mac-address  mac-address  | 
    mac-address  mac-address  } [ vlan 
    vlan-id  ]
     
    By default, no static IPv4 binding 
    entry is configured on a port. 
      
    						
    							 338 
    Setting the maximum number of  IPv4 source guard entries 
    The maximum number of IPv4 source guard entries is us ed to limit the total number of static and dynamic 
    IPv4 source guard entries on a port. When the numb er of IPv4 binding entries on a port reaches the 
    maximum, the port does not allowed new IPv4 binding entries any more. 
    If the maximum number of IPv4 binding entries to be configured is smaller than the number of existing 
    IPv4 binding entries on the port, the maximum number  can be configured successfully, and the existing 
    entries are not affected. New IPv4 binding entries, however, cannot be added until the number of IPv4 
    binding entries on the port drops below the configured maximum. 
    To configure the maximum number of IPv4 binding entries allowed on a port: 
     
    Step Command Remarks 
    1.   Enter system view. 
    system-view  N/A 
    2.  Enter Layer 2 Ethernet 
    interface view.  interface 
    interface-type  
    interface-number   N/A 
    3.
      Configure the maximum 
    number of IPv4 binding 
    entries allowed on the port.  ip verify source max-entries 
    number
      Optional. 
    By default, the maximum number is 
    1500 on the HP 5500 EI series 
    and 640 on the HP 5500 SI series.
     
     
    Configuring the IPv6 source guard function 
    You cannot enable IPv6 source guard on a link aggr
    egation member port or a service loopback port. If 
    IPv6 source guard is enabled on a  port, you cannot assign the port to a link aggregation group or a 
    service loopback group. 
    Configuring IPv6 source guard on a port 
    The IPv6 source guard function must be configured on a port before the port can obtain dynamic IPv6 
    source guard entries and use static and dynamic IPv6 source guard entries to filter packets. 
    •   For how to configure a static IPv6 static binding entry, see  Configuring a static IPv6 source guard 
    entr
    
    y . 
    •   Cooperating with DHCPv6 snooping, IP source  guard dynamically generates IP source guard 
    entries based on the DHCPv6 sn ooping entries that are generated during dynamic IP address 
    allocation. 
    •   Cooperating with ND snooping, IP source guard  dynamically generates IP source guard entries 
    based on dynamic ND snooping entries. 
    Dynamic IPv6 source guard entries can contain such information as the MAC address, IPv6 address, 
    VLAN tag, ingress port information and entry ty pe (DHCPv6 snooping or ND snooping), where the MAC 
    address, IPv6 address, and/or VLAN tag informat ion may not be included depending on your 
    configuration. IP source guard applies these entries to the port, so that the port can filter packets 
    accordingly. 
    Follow these guidelines when you configure IPv6 source guard: 
    •   If you repeatedly configure the IPv6 source guard function, only the last configuration takes effect.  
    						
    							 339 
    •  To  o b t a i n  dyn a m ic  I P v 6  s o u rc e  g u a rd  e n t ri e s,  m a ke  s u re  t h a t  D H C P v 6  s n o o pi n g  o r  N D  s n o o pi n g  i s  
    configured and works normally. For DHCPv6 an d ND snooping configuration information, see 
    Layer 3—IP Services Configuration Guide . 
    •   If you configure both ND snooping and DHCPv6 snooping on the device, IPv6 source guard uses 
    the type of entries that generated first. Because  DHCPv6 snooping entries are usually generated first 
    in such a case, IPv6 source guard usually uses th e DHCPv6 snooping entries to filter packets on a 
    port. 
    To configure the IPv6 source guard function on a port: 
     
    Step Command Remarks 
    1.   Enter system view. 
    system-view  N/A 
    2.  Enter Layer 2 Ethernet 
    interface view, port group 
    view.  interface
     interface-type 
    interface-number   N/A 
    3.
      Configure the IPv6 source 
    guard function on the port.  ipv6 verify source 
    { ipv6-address  | 
    ipv6-address  mac-address | 
    mac-address  }  Not configured by default. 
    The keyword specified in the 
    ipv6 
    verify source  command is only for 
    instructing the generation of 
    dynamic IPv6 source guard entries. 
    It does not affect static binding 
    entries. When using a static 
    binding entry, a port does not 
    consider the keyword into 
    consideration. 
     
      NOTE: 
    Although dynamic IPv6 source guard entries are genera ted based on DHCPv6 entries, the number of 
    dynamic IPv6 source guard entries is not necessarily the same as that of the DHCPv6 entries. 
     
    Configuring a static IPv6 source guard entry 
    Static IPv6 binding entries take effect only on ports configured with the IPv6 source guard function (see 
     Configuring the IPv6 source guard function )
     . 
    Port-based static IPv6 source guard entries and dyna mic IPv6 source guard entries take precedence over 
    global static IPv6 source guard entries. A port matc hes a packet against global static binding entries only 
    when the packet does not match any port-based static binding entry or dynamic binding entry on the 
    port. 
    Configuring global static IPv6 binding entries 
    A global static IPv6 binding entry defines the IPv6 address and MAC address of the packets that can be 
    forwarded by ports. It takes effect on all ports of the device. 
    To configure a global static IPv6 binding entry: 
     
    Step Command Remarks 
    1.   Enter system view. 
    system-view  N/A  
    						
    							 340 
    Step Command Remarks 
    2.  Configure a global static IPv6 
    binding entry.  ipv6 source binding ipv6-address
     
    ipv6-address mac-address  
    mac-address 
     
    No glob a l sta ti c IP v6  b ind ing entry  
    is configured by default. 
     
    Configuring port-based static IPv6 binding entries 
    Follow these guidelines to configure port-b ased static IPv6 source guard entries: 
    •   You cannot configure the same static binding entr y on one port repeatedly, but you can configure 
    the same static binding entry on different ports. 
    •   In an IPv6 source guard entry, the MAC address cannot be all 0s, all Fs (a broadcast MAC address), 
    or a multicast address, and the IPv6 address must be a unicast address and cannot be all 0s, all Fs, 
    or a loopback address. 
    •   IP source guard does not use the VLAN information (if specified) in static IPv6 binding entries to 
    filter packets. 
    •   When the ND detection function is configured, be sure to specif y the VL AN where ND detection is 
    configured in static binding entries. Otherwise,  ND packets will be discarded because they cannot 
    match any static IPv6 binding entry. 
    •   If a static binding entry to be added denotes the sa me binding as an existing dynamic binding entry, 
    the new static binding entry overwrites the dynamic binding entry. 
    To configure a static IPv6 source guard entry on a port: 
     
    Step Command Remarks 
    1.   Enter system view. 
    system-view  N/A 
    2.  Enter Layer 2 interface view.  interface 
    interface-type  
    interface-number   N/A 
    3.
      Configure a static IPv6 
    binding entry on a port.  ipv6 source binding
     { ipv6-address  
    ipv6-address |  ipv6-address 
    ipv6-address mac-address  
    mac-address  | mac-address  
    mac-address  } [ vlan vlan-id ]  By default, no static IPv6 binding 
    entry is configured on a port. 
     
    Setting the maximum number of
     IPv6 source guard entries 
    The maximum number of IPv6 source guard entries is us ed to limit the total number of static and dynamic 
    IPv6 source guard entries on a port. When the numb er of IPv6 binding entries on a port reaches the 
    maximum, the port does not allow new IPv6 binding entries any more. 
    If the maximum number of IPv6 binding entries to be configured is smaller than the number of existing 
    IPv6 binding entries on the port, the maximum number  can be configured successfully, and the existing 
    entries are not affected. New IPv6 binding entries, however, cannot be added until the number of IPv6 
    binding entries on the port drops below the configured maximum. 
    To configure the maximum number of IPv6 binding entries allowed on a port: 
     
    Step Command Remarks 
    1.   Enter system view. 
    system-view  N/A  
    						
    							 341 
    Step Command Remarks 
    2.  Enter Layer 2 Ethernet 
    interface view.  interface 
    interface-type  
    interface-number   N/A 
    3.
      Configure the maximum 
    number of IPv6 binding 
    entries allowed on the port.  ipv6 verify source max-entries 
    number
      Optional. 
    By default, the maximum number is 
    1500 on the HP 5500 EI series 
    and 640 on the HP 5500 SI series.
     
     
    Displaying and maintaining IP source guard 
    For IPv4 source guard:   
    Task Command  Remarks 
    Display static IPv4 source guard 
    entries.  display ip source binding static 
    [ interface 
    interface-type interface-number  | 
    ip-address ip-address  | mac-address 
    mac-address  ] [ slot  slot-number  ] [ | { begin 
    |  exclude  | include  } regular-expression ]  Available in any view 
    Display IPv4 source guard entries.  display ip source binding
     [ interface 
    interface-type interface-number  | 
    ip-address ip-address  | mac-address  
    mac-address  ] [ slot  slot-number  ] [ | { begin 
    |  exclude  | include  } regular-expression ]  Available in any view 
     
    For IPv6 source guard:  
    Task Command  Remarks 
    Display static IPv6 source guard 
    entries.  display ipv6 source binding static 
    [ interface 
    interface-type interface-number  | 
    ipv6-address ipv6-address  | mac-address 
    mac-address  ] [ slot  slot-number  ] [ | { begin | 
    exclude  | include  } regular-expression ]  Available in any view 
    Display IPv6 source guard entries.  display ipv6 source binding [ interface 
    interface-type interface-number 
    | 
    ipv6-address ipv6-address  | mac-address  
    mac-address  ] [ slot  slot-number  ] [ | { begin | 
    exclude  | include  } regular-expression ]  Available in any view
     
     
    IP source guard configuration examples 
    Static IPv4 source guard configuration example 
    Network requirements 
    As shown in Figure 120 , Host A and Host B are connected to ports GigabitEthernet 1/0/2 and 
    GigabitEthernet 1/0/1 of Device B respectively, Host C is connected to port GigabitEthernet 1/0/2 of  
    						
    							 342 
    Device A, and Device B is connected to port GigabitEthernet 1/0/1 of Device A. All hosts use static IP 
    addresses. 
    Configure static IPv4 source guard entries on Device  A and Device B to meet the following requirements: 
    •   On port GigabitEthernet 1/0/2 of Device A, only IP packets from Host C can pass. 
    •   On port GigabitEthernet 1/0/1 of Device A, only IP packets from Host A can pass. 
    •   On port GigabitEthernet 1/0/2 of Device B, only IP packets from Host A can pass. 
    •   On port GigabitEthernet 1/0/1 of Device B, only IP packets sourced from 192.168.0.2/24 can 
    pass. Host B can communicate with Host A by using this IP address even if it uses another network 
    adapter. 
    Figure 120  Network diagram 
     
      
    Configuration procedure 
    1. Configure Device A: 
    # Configure the IPv4 source guard function on Gi gabitEthernet 1/0/2 to filter packets based on 
    both the source IP address and MAC address. 
     system-view 
    [DeviceA] interface gigabitethernet 1/0/2 
    [DeviceA-GigabitEthernet1/0/2] ip verify source ip-address mac-address 
    # Configure GigabitEthernet 1/0/2 to allow only IP packets with the source MAC address of 
    0001-0203-0405 and the so urce IP address of 192.168.0.3 to pass. 
    [DeviceA] interface gigabitethernet 1/0/2 
    [DeviceA-GigabitEthernet1/0/2] ip source binding ip-address 192.168.0.3 mac-address 
    0001-0203-0405 
    [DeviceA-GigabitEthernet1/0/2] quit 
    # Configure the IPv4 source guard function on Gi gabitEthernet 1/0/1 to filter packets based on 
    both the source IP address and MAC address. 
    [DeviceA] interface gigabitethernet 1/0/1 
    [DeviceA-GigabitEthernet1/0/1] ip verify source ip-address mac-address 
    # Configure GigabitEthernet 1/0/1 to allow only IP packets with the source MAC address of 
    0001-0203-0406 and the so urce IP address of 192.168.0.1 to pass. 
    [DeviceA-GigabitEthernet1/0/1] ip source binding ip-address 192.168.0.1 mac-address 
    0001-0203-0406 
    [DeviceA-GigabitEthernet1/0/1] quit 
    2. Configure Device B: 
      
    						
    							 343 
    # Configure the IPv4 source guard function on Gi gabitEthernet 1/0/2 to filter packets based on 
    both the source IP address and MAC address. 
    [DeviceB] interface gigabitethernet 1/0/2 
    [DeviceB-GigabitEthernet1/0/2] ip verify source ip-address mac-address 
    # Configure GigabitEthernet 1/0/2 to allow only IP packets with the source MAC address of 
    0001-0203-0406 and the so urce IP address of 192.168.0.1 to pass. 
    [DeviceB] interface gigabitethernet 1/0/2 
    [DeviceB-GigabitEthernet1/0/2] ip source binding ip-address 192.168.0.1 mac-address 
    0001-0203-0406 
    [DeviceB-GigabitEthernet1/0/2] quit 
    # Configure the IPv4 source guard function on Gi gabitEthernet 1/0/1 to filter packets based on 
    the source IP address. 
    [DeviceB] interface gigabitethernet 1/0/1 
    [DeviceB-GigabitEthernet1/0/1] ip verify source ip-address 
    # Configure GigabitEthernet 1/0/1 to allow only IP packets with the source IP address of 
    192.168.0.2 to pass. 
    [DeviceB-GigabitEthernet1/0/1] ip source binding ip-address 192.168.0.2 \
    [DeviceB-GigabitEthernet1/0/1] quit 
    Verifying the configuration 
    # On Device A, display information about static IPv4  source guard entries. The output shows that the 
    static IPv4 source guard entries are configured successfully. 
    [DeviceA] display ip source binding static 
    Total entries found: 2 
     MAC Address       IP Address       VLAN   Interface               Type \
     0001-0203-0405    192.168.0.3      N/A    GE1/0/2                 Stati\
    c 
     0001-0203-0406    192.168.0.1      N/A    GE1/0/1                 Stati\
    c 
    # On Device B, display information about static IPv4 source guard entries. The output shows that the 
    static IPv4 source guard entries are configured successfully. 
    [DeviceB] display ip source binding static 
    Total entries found: 2 
     MAC Address       IP Address       VLAN   Interface               Type \
     0001-0203-0406    192.168.0.1      N/A    GE1/0/2                 Stati\
    c 
     N/A               192.168.0.2      N/A    GE1/0/1                 Stati\
    c 
    Dynamic IPv4 source guard using DHCP snooping 
    configuration example 
    Network requirements 
    As shown in Figure 121 , the device connects to the host (client) and the DHCP server through ports 
    GigabitEthernet 1/0/1 and GigabitEthernet 1/0/2 respectively. The host obtains an IP address from the 
    DHCP server. 
    Enable DHCP snooping on the device to record the DHCP snooping entry of the host. Enable the IPv4 
    source guard function on the device’s port GigabitEthernet 1/0/1 to filter packets based on the DHCP 
    snooping entry, allowing only packets from clients that obtain IP addresses through the DHCP server to 
    pass.  
    						
    							 344 
    For information about DHCP server configuration, see  Layer 3—IP Services Configuration Guide. 
    Figure 121  Network diagram 
     
     
    Configuration procedure 
    1. Configure DHCP snooping. 
    # Enable DHCP snooping. 
     system-view 
    [Device] dhcp-snooping 
    # Configure port GigabitEthernet 1/0/2, which is  connected to the DHCP server, as a trusted 
    port. 
    [Device] interface gigabitethernet1/0/2 
    [Device-GigabitEthernet1/0/2] dhcp-snooping trust 
    [Device-GigabitEthernet1/0/2] quit 
    2.  Configure the IPv4 source guard function. 
    # Configure the IPv4 source guard function on po rt GigabitEthernet 1/0/1 to filter packets based 
    on both the source IP address and MAC address. 
    [Device] interface gigabitethernet1/0/1 
    [Device-GigabitEthernet1/0/1] ip verify source ip-address mac-address 
    [Device-GigabitEthernet1/0/1] quit 
    Verifying the configuration 
    # Display the IPv4 source guard entries generated on port GigabitEthernet 1/0/1. 
    [Device] display ip source binding 
    Total entries found: 1 
     MAC Address       IP Address       VLAN   Interface            Type 
     0001-0203-0406    192.168.0.1      1      GE1/0/1              DHCP-SNP\
     
    # Display DHCP snooping entries to see whether they are consistent with the dynamic entries generated 
    on GigabitEthernet 1/0/1. 
    [Device] display dhcp-snooping 
     DHCP Snooping is enabled. 
     The client binding table for all untrusted ports. 
     Type : D--Dynamic , S--Static , R--Recovering 
     Type IP Address      MAC Address    Lease        VLAN SVLAN Interface 
     ==== =============== ============== ============ ==== ===== ===========\
    ====== 
     D    192.168.0.1     0001-0203-0406 86335        1    N/A   GigabitEthe\
    rnet1/0/1 
    ---   1 dhcp-snooping item(s) found   --- 
    The output shows that a dynamic IPv4 source gu ard entry has been generated based on the DHCP 
    snooping entry.  
    						
    							 345 
    Dynamic IPv4 source guard using DHCP relay configuration 
    example 
    Network requirements 
    As shown in Figure 122 , the host and the DHCP server are connected to the switch through interfaces 
    VLAN-interface 100 and VLAN-interface 200 respectively. DHCP relay is enabled on the switch. The host 
    (with the MAC address of 0001-0203-0406) obtains an IP address from the DHCP server through the 
    DHCP relay agent.  
    Enable the IPv4 source guard function on the switch’s  VLAN-interface 100 to filter packets based on the 
    DHCP relay entry, allowing only packets from clients that obtain IP addresses from the DHCP server to 
    pass. 
    Figure 122  Network diagram 
     
     
    Configuration procedure 
    1. Configure the IPv4 source guard function: 
    # Configure the IP addresses of the  interfaces. (Details not shown.) 
    # Configure the IPv4 source guard function on VLAN -interface 100 to filter packets based on both 
    the source IP address and MAC address. 
     system-view 
    [Switch] vlan 100 
    [Switch-Vlan100] quit 
    [Switch] interface vlan-interface 100 
    [Switch-Vlan-interface100] ip verify source ip-address mac-address 
    [Switch-Vlan-interface100] quit 
    2.  Configure the DHCP relay agent: 
    # Enable the DHCP service. 
    [Switch] dhcp enable 
    # Configure the IP address of the DHCP server. 
    [Switch] dhcp relay server-group 1 ip 10.1.1.1 
    # Configure VLAN-interface 100 to operate in DHCP relay mode. 
    [Switch] interface vlan-interface 100 
    [Switch-Vlan-interface100] dhcp select relay 
    #  Correlate VLAN-interface 100 with DHCP server group 1. 
    [Switch-Vlan-interface100] dhcp relay server-select 1 
    [Switch-Vlan-interface100] quit 
    Verifying the configuration 
    # Display the generated IPv4 source guard entries. 
    [Switch] display ip source binding  
    						
    All HP manuals Comments (0)

    Related Manuals for HP 5500 Ei 5500 Si Switch Series Configuration Guide