Tp-Link T1700G-28TQ V2 — network Security Configuration Guide: DHCP Snooping and ARP Detection [634/772]

Превью страниц Страница 634 / 772
Tp-Link T1700G-28TQ V2 [634/772] Network requirements
Configuring Network Security Configuration Examples
Configuration Guide
609
8
Configuration Examples
8.1 Example for DHCP Snooping and ARP Detection
8.1.1 Network Requirements
As shown below, User 1 and User 2 get IP addresses from the DHCP server, and User 3 has
a static IP address. All of them are in the default VLAN 1. Now, untrusted DHCP packets
need to be filtered to ensure that the DHCP clients (User 1 and User 2) can get the IP
addresses from the legal DHCP server. Additionally, the network needs to be prevented
from ARP attacks.
Figure 8-1 Network Topology
Gi1/0/4
Gi1/0/1
Gi1/0/2
Gi1/0/3
User 3
88-A9-D4-54-FD-C3
192.168.0.33/24
User 1
74-D3-45-32-B6-8D
User 2
76-D9-33-56-78-A3
Switch A
DHCP
Server
8.1.2 Configuration Scheme
To meet these requirements, you can configure DHCP Snooping to filter the untrusted
DHCP messages from the illegal DHCP server and configure ARP Detection and ARP
Defend to prevent the network from ARP attacks. The overview of configuration is as
follows:
1) Configure DHCP Snooping on Switch A. Set port 1/0/4 as the trusted port and other
ports as untrusted ports.
2) Configure IP-MAC Binding on Switch A. The binding entries for User 1 and User 2 are
automatically recorded via DHCP Snooping, and you need to manually bind the entry for
User 3.

Содержание

3073

Learn how to configure network security with DHCP Snooping and ARP Detection to protect against unauthorized DHCP servers and ARP attacks. Ensure a secure network environment.