Home > HP > Printer > HP 5500 Ei 5500 Si Switch Series Configuration Guide

HP 5500 Ei 5500 Si Switch Series Configuration Guide

    Download as PDF Print this page Share this page

    Have a look at the manual HP 5500 Ei 5500 Si Switch Series Configuration Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 1114 HP manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    Page
    of 2513
    							 376 
    Configuring URPF (available only on the HP 
    5500 EI) 
    The term router in this feature refers to both routers and Layer 3 switches. 
    URPF overview 
    What is URPF 
    Unicast Reverse Path Forwarding (URPF) protects a network against source address spoofing attacks, 
    such as denial of service (DoS) and distributed denial of service (DDoS) attacks. 
    Attackers launch attacks by creating a series of packets with forged source addresses. For applications 
    using IP-address-based authentication, this type of attack allows unauthorized users to access the system 
    in the name of authorized users, or to even access the system as the administrator. Even if the attackers 
    cannot receive any response packets, the attacks are still disruptive to the attacked target. 
    Figure 136 Attack based on source address spoofing 
     
     
    As shown in Figure 136, Router A sends the server (Router B) requests with a forged source IP address 
    2.2.2.1 at a high rate, and Router B sends packets to IP address 2.2.2.1 (Router C) in response to the 
    requests. Consequently, both Router B and Router C are attacked. 
    URPF can prevent this source address spoofing attack  by checking the source addresses of packets and 
    filtering out invalid packets. 
    URPF check modes 
    URPF provides two check modes: strict and loose.  
    Strict URPF 
    To pass strict URPF check, the source address and receiving interface of a packet must match the 
    destination address and output interface of a forwarding information base (FIB) entry. 
    In some scenarios such as asymmetrical routing, strict URPF may discard valid packets. 
    Strict URPF is often deployed between an internet  service provider (ISP) and the connected users. 
    Loose URPF 
    To pass loose URPF check, the source address of a packet must match the destination address of a FIB 
    entry. Loose URPF can avoid discarding valid packets, but may let go attack packets. 
    Loose URPF is often deployed between ISPs, especially in asymmetrical routing.  
    						
    							 377 
    How URPF works 
    URPF does not check multicast packets. 
    URPF works in the steps, as shown in Figure 137. 
    Figure 137  URPF work flow 
     
    1. URPF checks the source address validity:  
    						
    							 378 
    { Discards packets with a broadcast source address. 
    { Discards packets with an all-zero source address but a non-broadcast destination address. (A 
    packet with source address 0.0.0.0 and destination address 255.255.255.255 might be a 
    DHCP or BOOTP packet, and is not discarded.) 
    { For other packets, precede to step 2. 
    2. URPF checks whether the source address matches a FIB entry: 
    {  If yes, precede to step 3. 
    { If not, precede to step 6. 
    3. URPF checks whether the check mode is loose: 
    {  If yes, precede to step 8. 
    { If not, URPF checks whether the matching route is a direct route: if yes, precede to step 5; if not, 
    precede to step 4. 
    4. URPF checks whether the receiving interface matches  the output interface of the matching FIB entry.   
    { If yes, precede to step 8. 
    { If not, precede to step 9. 
    5. URPF checks whether the source IP address matches an ARP entry. 
    {  If yes, precede to step 8. 
    { If not, precede to step 9. 
    6. URPF checks whether the FIB table has a default route.  
    {  If yes, precede to step 7. 
    { If not, precede to step 9. 
    7. URPF checks whether the check mode is loose: 
    {  If yes, precede to step 8. 
    { If not, URPF checks whether the output interface of the default route matches the receiving 
    interface of the packet: if yes, precede to step 8; if not, precede to step 9. 
    8. The packet passes the check and is forwarded. 
    9. The packet is discarded.  
    						
    							 379 
    Network application 
    Figure 138 Network diagram 
     
     
    Configure strict URPF between each ISP and its connected users, and loose URPF between ISPs. 
    Configuring URPF 
    To configure URPF globally:  
    Step Command Remarks 
    1.  Enter system view. 
    system-view  N/A 
    2.  Enable URPF check globally. 
    ip urpf { loose  | strict }   Disabled by default. 
     
     NOTE: 
    •  The routing table size decreases by half when URPF is enabled on the HP 5500 EI switches.  
    •   To prevent loss of routes and packets, URPF cannot be enabled if the number of route entries the switch
    maintains exceeds half the routing table size. 
     
    URPF configuration example 
    Network requirements 
    As shown in  Figure 139, a client (Switch A) directly connects to the ISP switch (Switch B). Enable URPF 
    check on Switch A and Switch B to prevent source address spoofing attacks.   
    						
    							 380 
    Figure 139 Network diagram 
     
     
    Configuration procedure 
    1. Configure Switch A: 
    # Enable strict URPF check. 
     system-view 
    [SwitchA] ip urpf strict 
    2. Configure Switch B: 
    # Enable strict URPF check. 
     system-view 
    [SwitchB] ip urpf strict 
      
    						
    							 381 
    Configuring SAVI 
    SAVI overview 
    Source Address Validation (SAVI) is applied on access devices. SAVI creates a table of bindings between 
    addresses and ports through other features such as ND snooping, DHCPv6 snooping, and IP Source 
    Guard, and uses those bindings to check the validity of the source addresses of DHCPv6 protocol 
    packets, ND protocol packets, and IPv6 data packets.  
    SAVI can be used in the following address assignment scenarios:  
    •   DHCPv6-only: The hosts connected to the SAVI-e nabled device obtain addresses only through 
    DHCPv6. 
    •   SLAAC-only: The hosts connected to the SAVI-enabled device obtain addresses only through 
    Stateless Address Autoconfiguration (SLAAC).  
    •   DHCPv6+SLAAC: The hosts connected to the SAVI-enabled device obtain addresses through 
    DHCPv6 and SLAAC.  
    The following section describes SAVI configurations in these address assignment scenarios.  
    Configuring global SAVI 
     
    Step Command Remarks 
    1.   Enter system view. 
    system-view  N/A 
    2.  Enable the SAVI 
    function.  ipv6 savi strict 
    Disabled by default. 
    3.  Set the time to wait for a 
    duplicate address 
    detection (DAD) NA.  ipv6 savi dad-delay 
    value  Optional 
    One second by default. 
    If no DAD NA is received within the specified 
    time when the corresponding ND snooping 
    entry is in detect state, the ND snooping entry 
    changes to bound state.  
    4.
      Set the time to wait for a 
    DAD NS from a 
    DHCPv6 client.  ipv6 savi dad-preparedelay 
    value
      Optional 
    One second by default. 
    This command is used with the DHCPv6 
    snooping function. After DHCPv6 snooping 
    detects that a client obtains an IPv6 address, it 
    monitors whether the client detects IP address 
    conflict. If DHCPv6 snooping does not receive 
    any DAD NS from the client before the set 
    time expires, SAVI sends a DAD NS on behalf 
    of the client.  
      
    						
    							 382 
     NOTE: 
    If a port on the SAVI enabled device is down for  three minutes or more, the device deletes the DHCPv6 
    snooping entries and ND snooping entries corresponding to the port. 
     
    SAVI configuration in DHCPv6-only address 
    assignment scenario 
    Network requirements 
    Figure 140  Network diagram 
     
     
    As shown in Figure 140, Sw i t c h  A  i s  t h e  D H C P v 6  s e r v e r.  Sw i t c h  B  c o n n e c t s  t o  t h e  D H C P v 6  s e r v e r  t h ro u g h  
    interface GigabitEthernet 1/0/1, and connects to two DHCPv6 clients through interfaces 
    GigabitEthernet 1/0/2 and GigabitEthernet 1/0/3. The three interfaces of Switch B belong to VLAN 2. 
    The client can obtain IP address only through DHCPv6. Configure SAVI on Switch B to automatically bind 
    the IP addresses assigned through DHCPv6 and permit  only packets from bound addresses and link-local 
    addresses.  
    Configuration considerations 
    Configure Switch B as follows: 
    •   Enable SAVI. 
    •   Enable DHCPv6 snooping. For more information about DHCPv6 snooping, see  Layer 3—IP 
    Services Configuration Guide . 
    •   Enable link-local address ND snooping. For more information about ND snooping, see  Layer 3—IP 
    Services Configuration Guide . 
    •   Enable ND detection in VLAN 2 to check the ND packets arrived on the ports. For more information 
    about ND detection, see  Configuring ND attack defense .
      
    •   Configure a static IPv6 source guard binding entry on each interface connected to a client. This step 
    i s  o p t io n a l.  I f  t h i s  s te p  i s  no t  p e r fo rm e d,  SAV I  d o es not check packets against static binding entries. 
    For more information about static IPv6  source guard binding entries, see Configuring IP source 
    guar
    
    d . 
    •   Configure dynamic IPv6 source guard binding on the interfaces connected to the clients. For more 
    information about dynamic IPv6 source guard binding, see  Configuring IP source guard.
      
    GE1/0/1
    Switch A
    DHCPv6 server
    Switch B
    GE1/0/2 GE1/0/3
    DHCPv6 client
    DHCPv6 client 
    						
    							 383 
    Packet check principles 
    Switch B checks DHCPv6 protocol packets from DHCPv6 clients against link-local address ND snooping 
    entries; checks ND protocol packets against link-l ocal address ND snooping entries, DHCPv6 snooping 
    entries, and static binding entries; and checks th e IPv6 data packets from the clients against dynamic 
    binding entries (including link-local address  ND snooping entries and DHCPv6 snooping entries) 
    applied on the interfaces connected to the clients an d against static binding entries. The items to be 
    examined include MAC address, IPv6 address, VLAN information, and ingress port.  
    Configuration procedure 
    # Enable SAVI. 
     system-view 
    [SwitchB] ipv6 savi strict 
    # Enable IPv6. 
    [SwitchB] ipv6 
    # Globally enable DHCPv6 snooping. 
    [SwitchB] ipv6 dhcp snooping enable 
    # Assign interfaces GigabitEthernet 1/0/1, GigabitEthernet 1/0/2, and GigabitEthernet 1/0/3 to 
    VLAN 2.  
    [SwitchB] vlan 2 
    [SwitchB-vlan2] port gigabitethernet 1/0/1 gigabitethernet 1/0/2 gigabitethernet 1/0/3 
    # Enable DHCPv6 snooping in VLAN 2.  
    [SwitchB-vlan2] ipv6 dhcp snooping vlan enable 
    [SwitchB] quit 
    # Configure interface GigabitEthernet 1/0/1 as a DHCP snooping trusted port. 
    [SwitchB] interface gigabitethernet 1/0/1 
    [SwitchB-GigabitEthernet1/0/1] ipv6 dhcp snooping trust 
    [SwitchB-GigabitEthernet1/0/1] quit 
    # Enable link-local address ND snooping and ND detection.  
    [SwitchB] ipv6 nd snooping enable link-local 
    [SwitchB] vlan 2 
    [SwitchB-vlan2] ipv6 nd snooping enable 
    [SwitchB-vlan2] ipv6 nd detection enable 
    [SwitchB-vlan2] quit 
    # Configure the dynamic IPv6 source guard binding function on downlink ports GigabitEthernet 1/0/2 
    and GigabitEthernet 1/0/3.  
    [SwitchB] interface gigabitethernet 1/0/2 
    [SwitchB-GigabitEthernet1/0/2] ipv6 verify source ipv6-address mac-addre\
    ss 
    [SwitchB-GigabitEthernet1/0/2] quit 
    [SwitchB] interface gigabitethernet 1/0/3 
    [SwitchB-GigabitEthernet1/0/3] ipv6 verify source ipv6-address mac-addre\
    ss 
    [SwitchB-GigabitEthernet1/0/3] quit  
    						
    							 384 
    SAVI configuration in SLAAC-only address 
    assignment scenario 
    Network requirements 
    Figure 141 Network diagram 
     
     
    As shown in Figure 141, Swi tch  A  se r ve s  as  t h e  g a teway.  Swi tch  B  c o n ne cts  H os t  A  a nd  H os t  B.  Th e  hos ts  
    can obtain IPv6 addresses only through SLAAC. Configure SAVI on Switch B to bind the addresses 
    assigned through SLAAC and permit only packets from the bound addresses.  
    Configuration considerations  
    Configure Switch B as follows: 
    •   Enable SAVI. 
    •   Enable global unicast address ND snooping and link-local address ND snooping. For more 
    information about ND snooping, see  Layer 3—IP Services Configuration Guide . 
    •   Enable ND detection in VLAN 10 to check the ND packets arrived on the ports. For more 
    information about ND detection, see  Configuring ND attack defense.
      
    •   Configure a static IPv6 source guard binding entry on each interface connected to a host. This step 
    i s  o p t io n a l.  I f  t h i s  s te p  i s  no t  p e r fo rm e d,  SAV I  d o es not check packets against static binding entries. 
    For more information about static IPv6  source guard binding entries, see Configuring IP source 
    guar
    
    d . 
    •   Configure dynamic IPv6 source guard binding on the interfaces connected to the hosts. For more 
    information about dynamic IPv6 source guard binding, see  Configuring IP source guard.
      
    •   Enable DHCPv6 snooping and leave the interface connected to the gateway as its default status 
    (non-trusted port) so that the hosts cannot  obtain IP addresses through DHCPv6. For more 
    information about DHCPv6 snooping, see  Layer 3—IP Services Configuration Guide. 
    Switch A
    Switch B
    Host A Host B
    GE1/0/3
    Vlan-int10 
    10::1
    Gateway
    GE1/0/1GE1/0/3
    GE1/0/2
    VLAN 10
    10::6
    0001-0203-0607
    10::5
    0001-0203-0405
    Internet 
    						
    							 385 
    Packet check principles 
    Switch B checks ND protocol packets against ND snooping entries and static binding entries; and checks 
    the IPv6 data packets from the hosts against dynami c binding entries (including ND snooping entries) 
    applied on the interfaces connected to the hosts an d against static binding entries. The items to be 
    examined include MAC address, IPv6 address, VLAN information, and ingress port. 
    Configuration procedure 
    # Enable SAVI. 
     system-view 
    [SwitchB] ipv6 savi strict 
    # Enable IPv6. 
    [SwitchB] ipv6 
    # Assign GigabitEthernet 1/0/1, GigabitEthernet 1/0/2, and GigabitEthernet 1/0/3 to VLAN 10. 
    [SwitchB] vlan 10 
    [SwitchB-vlan10] port gigabitethernet 1/0/1 gigabitethernet 1/0/2 gigabitethernet  1/0/3 
    [SwitchB-vlan10] quit 
    # Enable global unicast address ND snooping and link-local address ND snooping.  
    [SwitchB] ipv6 nd snooping enable link-local 
    [SwitchB] ipv6 nd snooping enable global 
    [SwitchB] vlan 10 
    [SwitchB-vlan10] ipv6 nd snooping enable 
    # Enable ND detection.  
    [SwitchB-vlan10] ipv6 nd detection enable 
    [SwitchB-vlan10] quit 
    # Enable DHCPv6 snooping.  
    [SwitchB] ipv6 dhcp snooping enable 
    # Configure uplink port GigabitEthernet 1/0/3 as an ND trusted port.  
    [SwitchB] interface gigabitethernet 1/0/3 
    [SwitchB-GigabitEthernet1/0/3] ipv6 nd detection trust 
    [SwitchB-GigabitEthernet1/0/3] quit 
    # Configure the dynamic IPv6 source guard binding function on downlink ports GigabitEthernet 1/0/1 
    and GigabitEthernet 1/0/2. 
    [SwitchB] interface gigabitethernet 1/0/1 
    [SwitchB-GigabitEthernet1/0/1] ipv6 verify source ipv6-address mac-addre\
    ss 
    [SwitchB-GigabitEthernet1/0/1] quit 
    [SwitchB] interface gigabitethernet 1/0/2 
    [SwitchB-GigabitEthernet1/0/2] ipv6 verify source ipv6-address mac-addre\
    ss 
    [SwitchB-GigabitEthernet1/0/2] quit  
    						
    All HP manuals Comments (0)

    Related Manuals for HP 5500 Ei 5500 Si Switch Series Configuration Guide