Checking The Configuration - Huawei Quidway S9300 Configuration Manual

Terabit routing switch v100r001c03
Table of Contents

Advertisement

Quidway S9300 Terabit Routing Switch
Configuration Guide - Security
Context
After the function of checking IP packets is enabled, the S9300 checks the received IP packets
against the binding table. The check items include the source IP address, source MAC address,
VLAN ID, and interface number.
Procedure
Step 1 Run:
system-view
The system view is displayed.
Step 2 Run:
interface interface-type interface-number
The interface view is displayed.
This is a user-side interface. The interface can be an Ethernet interface, a GE interface, or an
Eth-Trunk interface.
Step 3 Run:
ip source check user-bind check-item { ip-address | mac-address | vlan }
The check items of IP packets are configured.
When receiving an IP packet, the interface checks the IP packet according to the check items,
including the source IP address, source MAC address, VLAN, or the combination of these three
items. If the IP packet matches the binding table according to the check items, the packet is
forwarded; otherwise, the packet is discarded.
By default, the check items consist of IP address, MAC address, VLAN, and interface. This
command is used in the interface view; therefore, you only need to specify the IP address, MAC
address, and VLAN.
----End

3.3.5 Checking the Configuration

Prerequisite
The configurations of IP source guard are complete.
Procedure
Step 1 Run the display user-bind { all | { ip-address ip-address | mac-address mac-address | vlan
vlan-id | interface interface-type interface-number | user-type { static | dynamic } }
command to view information about the binding table.
Step 2 Run the display ip source check user-bind interface interface-type interface-number
command to view the configuration of the IP source guard function on the interface.
----End
Issue 01 (2009-07-28)
NOTE
This command is valid only for dynamic binding entries.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
3 IP Source Guard Configuration
*
*
}
3-5

Advertisement

Table of Contents
loading

Table of Contents