1、PC1的IP地点和mac地点做全局静态ARP绑定;- 全局下:address-bind 192.168.1.1 mac(pc1)
- G0/2:ip verify source port-security
- arp-check
复制代码 2、PC2的IP地点和MAC地点做全局IP+MAC绑定:- Address-bind 192.168.1.2 0050.7966.6807
- Address-bind uplink g0/1
- Address-bind binding-filter logging
- Address-bind install
复制代码 3、PC3地点的端口,做三层端口安全,且发现违例报文后将端口关闭,并发送trap消息﹔- G0/2:switchport port-security mac-address 144f.d7c0.79c3 vlan X 192.168.3.1
- switchport port-security violation restrict
- switchport port-security violation shutdown
复制代码 4、PC4通过DHCP获取IP地点,通过设置实现防止终端私设IP地点和非法DHCP服务器接入的需求;- 全局:IP DHCP snooping
- 上联dhcp服务器的接口:ip dhcp snooping trust
- G0/0:ip verify source port-security
复制代码 5、L1和L2毗连终端的接口,全部启用单端口防环,违例动作为block端口,5分钟后自动规复;- 首先全局下开启rldp enable
- 所有连终端的端口:rldp port loop-detect block
- errdisable recover interval 300
复制代码 6、L1和L2全部接入终端的接口,启用防ARP诱骗功能和防网关ARP诱骗功能。- IP DHCP snooping已配置
- 所有连终端端口:anti-arp-spoofing ip 网关ip//防网关arp欺骗
- Arp check//防arp欺骗
- ip verify source port-security //ip source guard
复制代码
免责声明:如果侵犯了您的权益,请联系站长,我们会及时删除侵权内容,谢谢合作!qidao123.com:ToB企服之家,中国第一个企服评测及软件市场,开放入驻,技术点评得现金 |