16-Security Command Reference

HomeSupportWirelessvAC1000 Virtual Access ControllerReference GuidesCommand ReferencesH3C vAC1000 Virtual Access Controller Command References(R5435P03)-6W10016-Security Command Reference
05-IP source guard commands
Title Size Download
05-IP source guard commands 57.99 KB

IP source guard commands

display ip source binding

Use display ip source binding to display IPv4SG bindings.

Syntax

display ip source binding [ wlan-snooping ] [ ip-address ip-address ] [ mac-address mac-address ] [ vlan vlan-id ]

Views

Any view

Predefined user roles

network-admin

network-operator

Parameters

wlan-snooping: Specifies the WLAN snooping module.

ip-address ip-address: Specifies an IPv4 address.

mac-address mac-address: Specifies a MAC address in H-H-H format.

vlan vlan-id: Specifies a VLAN ID in the range of 1 to 4094.

interface interface-type interface-number: Specifies an interface by its type and number.

Examples

# Display all IPSG bindings on the public network.

<Sysname> display ip source binding

Total entries found: 2

IP Address      MAC Address    Interface                VLAN Type

10.1.0.5        040a-0000-4000 WLAN-BSS1/0/1            1    WLAN snooping

10.1.0.6        040a-0000-3000 WLAN-BSS1/0/2            1    WLAN snooping

Table 1 Command output

Field

Description

Total entries found

Total number of IPv4SG bindings.

IP Address

IPv4 address in the IPv4SG binding. If no IP address is bound in the binding, this field displays N/A.

MAC Address

MAC address in the IPv4SG binding. If no MAC address is bound in the binding, this field displays N/A.

Interface

Interface of the binding. This field displays N/A for a global IPv4SG binding.

VLAN

VLAN information in the IPv4SG binding. If the binding contains no VLAN information, this field displays N/A.

Type

Type of the IPv4SG binding.

WLAN snooping indicates that the IPv4SG binding is dynamically generated based on WLAN snooping. The binding is used by other modules to provide security services.

 

Related commands

ip verify source

display ipv6 source binding

Use display ipv6 source binding to display IPv6SG bindings.

Syntax

display ipv6 source binding [ wlan-snooping ] [ ip-address ipv6-address ] [ mac-address mac-address ] [ vlan vlan-id ]

Views

Any view

Predefined user roles

network-admin

network-operator

Parameters

wlan-snooping: Specifies the WLAN snooping module.

ip-address ipv6-address: Specifies an IPv6 address.

mac-address mac-address: Specifies a MAC address in H-H-H format.

vlan vlan-id: Specifies a VLAN ID in the range of 1 to 4094.

interface interface-type interface-number: Specifies an interface by its type and number.

Examples

# Display all IPv6SG bindings on the public network.

<Sysname> display ipv6 source binding

Total entries found: 1

IPv6 Address         MAC Address    Interface               VLAN Type

2012:1222:2012:1222: 000f-2202-0435 WLAN-BSS1/0/1           1    DHCPv6 snooping

2012:1222:2012:1222

Table 2 Command output

Field

Description

Total entries found

Total number of IPv6SG bindings.

IPv6 Address

IPv6 address in the IPv6SG binding. If no IPv6 address is bound in the binding, this field displays N/A.

MAC Address

MAC address in the IPv6SG binding. If no MAC address is bound in the binding, this field displays N/A.

Interface

Interface of the IPv6SG binding. This field displays N/A for a global IPv6SG binding.

VLAN

VLAN information in the IPv6SG binding. If the binding contains no VLAN information, this field displays N/A.

Type

Type of the IPv6SG binding.

WLAN snooping indicates that the IPv6SG binding is dynamically generated based on WLAN snooping. The binding is used by other modules to provide security services.

 

Related commands

ipv6 verify source

ip verify source

Use ip verify source to enable the IPSG feature for IPv4.

Use undo ip verify source to disable the IPSG feature for IPv4.

Syntax

ip verify source

undo ip verify source

Default

The IPSG feature is disabled for IPv4.

Views

Service template view

Predefined user roles

network-admin

Usage guidelines

This feature uses WLAN snooping entries to filter IPv4 packets received by an AP. It drops packets that do not match the entries. A WLAN snooping entry is an IP-MAC binding.

In an IPv4 network, IPSG uses only the WLAN snooping entries obtained through DHCP packets.

Examples

# Enable the IPSG feature for IPv4.

<Sysname> system-view

[Sysname] wlan service-template security

[Sysname-wlan-st-security] ip verify source

ip verify unknown-ip

Use ip verify unknown-ip to configure the processing method for packets from unknown source IPv4 addresses received by APs.

Use undo ip verify unknown-ip to restore the default.

Syntax

ip verify unknown-ip { deauthenticate | drop }

undo ip verify unknown-ip

Default

An AP drops packets from unknown source IPv4 addresses.

Views

Service template view

Predefined user roles

network-admin

Parameters

deauthenticate: Drops packets from unknown source IPv4 addresses and sends deauthentication frames to the sources.

drop: Drops packets from unknown source IPv4 addresses only.

Usage guidelines

Unknown source IPv4 addresses refer to the following addresses:

·     IPv4 addresses learned from ARP packets that are intercepted by APs.

·     IPv4 addresses that have not been learned by APs.

This command is configurable only when the service template is disabled.

This command takes effect only when the IPSG feature is enabled for IPv4.

Examples

# Configure APs to drop packets from unknown source IPv4 addresses.

<Sysname> system-view

[Sysname] wlan service-template service1

[Sysname-wlan-st-service1] ip verify unknown-ip drop

ipv6 verify source

Use ipv6 verify source to enable the IPSG feature for IPv6.

Use undo ipv6 verify source to disable the IPSG feature for IPv6.

Syntax

ipv6 verify source

undo ipv6 verify source

Default

The IPSG feature is disabled for IPv6.

Views

Service template view

Predefined user roles

network-admin

Usage guidelines

This feature uses WLAN snooping entries to filter IPv6 packets received by an AP. It drops packets that do not match the entries. A WLAN snooping entry is an IP-MAC binding.

Examples

# Enable the IPSG feature for IPv6.

<Sysname> system-view

[Sysname] wlan service-template security

[Sysname-wlan-st-security] ipv6 verify source

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
All Support
  • Become a Partner
  • Partner Resources
  • Partner Business Management
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网