Tp-Link T2600G-28MPS V2 [858/1027] Configuration examples

Tp-Link T2600G-28MPS V2 [858/1027] Configuration examples
Configuration Guide 827
Configuring Network Security Configuration Examples
15
Configuration Examples
15.1 Example for DHCP Snooping and ARP Detection
15.1.1 Network Requirements
As shown below, User 1 and User 2 get IP addresses from the legal DHCP server, and
User 3 has a static IP address. All of them are in the default VLAN 1. Now, untrusted DHCP
packets need to be filtered to ensure that the DHCP clients (User 1 and User 2) can get the
IP addresses from the legal DHCP server. Additionally, the network needs to be prevented
from ARP attacks.
Figure 15-1 Network Topology
Gi1/0/4
Gi1/0/1
Gi1/0/2
Gi1/0/3
Gi1/0/5
User 3
88-A9-D4-54-FD-C3
192.168.0.33/24
User 1
74-D3-45-32-B6-8D
Attacker/Illegal
DHCP Server
User 2
76-D9-33-56-78-A3
Switch A
Legal DHCP Server
15.1.2 Configuration Scheme
To meet these requirements, you can configure DHCP Snooping to filter the untrusted
DHCP packets from the illegal DHCP server and configure ARP Detection and ARP Defend
to prevent the network from ARP attacks.
The overview of configuration is as follows:
1) Configure DHCP Snooping on Switch A. Set port 1/0/4 that is connected to the legal
DHCP server as the trusted port and other ports as untrusted ports. So that the illegal
DHCP server on any other port cannot assign IP addresses for the clients.

Содержание

Похожие устройства

Скачать