10-Security

HomeSupportConfigure & DeployConfiguration GuidesH3C Access Controllers Configuration Guides(E5208P03 E5215P01 R5215P01)-6W10210-Security
16-IP source guard configuration
Title Size Download
16-IP source guard configuration 93.46 KB

Configuring IP source guard

Overview

IP source guard (IPSG) prevents spoofing attacks by using WLAN snooping entries to filter packets received by an AP. It drops packets that do not match the entries.

WLAN snooping is enabled by default on the AP. A WLAN snooping entry is an IP-MAC binding.

·     In an IPv4 network, WLAN snooping reads the clients' IP-MAC bindings from the ARP messages or DHCP packets that pass through the AP. IPSG uses only the WLAN snooping entries obtained through DHCP packets.

·     In an IPv6 network, WLAN snooping reads the clients' IP-MAC bindings from packets that pass through the AP. The packets are RA messages, NS messages, NA messages, and DHCP packets. IPSG uses all WLAN snooping entries for packet filtering.

For information about DHCP, DHCPv6, and ND, see Layer 3—IP Services Configuration Guide.

As shown in Figure 1, the AP has a WLAN snooping entry for the client that has obtained an IP address from the DHCP server. IPSG forwards packets only from the legal client.

Figure 1 IPSG application

 

Configuring the IPSG feature

IPSG enabled for a service template filters only packets from the clients in the BSSs created based on the service template. It does not affect clients in other BSSs.

To configure the IPSG feature:

 

Step

Command

Remarks

1.     Enter system view.

system-view

N/A

2.     Enter service template view.

wlan service-template service-template-number

N/A

3.     Enable the IPSG feature for IPv4.

ip verify source

By default, the IPSG feature is disabled for IPv4.

4.     Enable the IPSG feature for IPv6.

ipv6 verify source

By default, the IPSG feature is disabled for IPv6.

 

Configuring the processing method for packets from unknown source IPv4 addresses

This feature is applicable only to ACs.

After you enable the IPSG feature on the AC, the IPv4 addresses learned from DHCP packets by APs are determined as known source IPv4 addresses. The following IPv4 addresses are unknown source IPv4 addresses:

·     IPv4 addresses learned from ARP packets that pass through APs.

·     IPv4 addresses that have not been learned by APs.

You can configure APs to process incoming packets from unknown source IPv4 addresses by using either of the following methods:

·     Drop the packets only.

·     Drop the packets and send deauthentication frames to the sources.

To configure the processing method for packets from unknown source IPv4 addresses received on APs:

 

Step

Command

Remarks

1.     Enter system view.

system-view

N/A

2.     Enter service template view.

wlan service-template service-template-number

N/A

3.     Configure the processing method for packets from unknown source IPv4 addresses received on APs.

ip verify unknown-ip { deauthenticate | drop }

By default, APs drop packets from unknown source IPv4 addresses and send deauthentication frames to the sources.

 

IPSG configuration example

Network requirements

As shown in Figure 2, the clients access the WLAN through SSID service. Client 1 and Client 2 obtain IP addresses through the DHCP server (the switch).

Enable IPSG for the service template on the AC to make the AP filter incoming packets. The AP forwards the packets only from Client 1 and Client 2.

Figure 2 Network diagram

 

Configuration procedure

# Create service template 1.

<AC> system-view

[AC] wlan service-template 1

# Set the SSID to service for the service template, and enable the service template.

[AC-wlan-st-1] ssid service

[AC-wlan-st-1] service-template enable

# Enable the IPSG feature for IPv4.

[AC-wlan-st-1] ip verify source

[AC-wlan-st-1] quit

# Create the AP ap1 with the mode WA4620i-CAN, and set its serial ID to 210235A29G007C000020.

[AC] wlan ap ap1 model WA4320i-ACN

[AC-wlan-ap-ap1] serial-id 210235A29G007C000020

# Enter radio view of radio 2 and bind service template 1 to radio 2.

[AC-wlan-ap-ap1] radio 2

[AC-wlan-ap-ap1-radio-2] service-template 1

[AC-wlan-ap-ap1-radio-2] quit

[AC-wlan-ap-ap1] quit

Verifying the configuration

# Use Client 1 and Client 2 to obtain their IP addresses through DHCP, and manually assign Client 3 the IP address of Client 1. (Details not shown.)

# Verify that packets from Client 1 and Client 2 are allowed to pass. (Details not shown.)

# Verify that packets from client 3 are dropped. (Details not shown.)

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Intelligent Storage
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
  • Technical Blogs
All Support
  • Become A Partner
  • Partner Policy & Program
  • Global Learning
  • Partner Sales Resources
  • Partner Business Management
  • Service Business
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网