- Table of Contents
-
- 16-Security Command Reference
- 00-Preface
- 01-ACL commands
- 02-APR commands
- 03-ARP attack protection commands
- 04-ASPF commands
- 05-IP source guard commands
- 06-IPsec commands
- 07-ND attack defense commands
- 08-Password control commands
- 09-PKI commands
- 10-SSH commands
- 11-SSL commands
- 12-User profile commands
- 13-Public key management commands
- 14-Attack detection and prevention commands
- 15-Session management commands
- 16-Crypto engine commands
- 17-Connection limit commands
- 18-Time range commands
- Related Documents
-
Title | Size | Download |
---|---|---|
05-IP source guard commands | 57.99 KB |
Contents
IP source guard commands
display ip source binding
Use display ip source binding to display IPv4SG bindings.
Syntax
display ip source binding [ wlan-snooping ] [ ip-address ip-address ] [ mac-address mac-address ] [ vlan vlan-id ]
Views
Any view
Predefined user roles
network-admin
network-operator
Parameters
wlan-snooping: Specifies the WLAN snooping module.
ip-address ip-address: Specifies an IPv4 address.
mac-address mac-address: Specifies a MAC address in H-H-H format.
vlan vlan-id: Specifies a VLAN ID in the range of 1 to 4094.
interface interface-type interface-number: Specifies an interface by its type and number.
Examples
# Display all IPSG bindings on the public network.
<Sysname> display ip source binding
Total entries found: 2
IP Address MAC Address Interface VLAN Type
10.1.0.5 040a-0000-4000 WLAN-BSS1/0/1 1 WLAN snooping
10.1.0.6 040a-0000-3000 WLAN-BSS1/0/2 1 WLAN snooping
Table 1 Command output
Field |
Description |
Total entries found |
Total number of IPv4SG bindings. |
IP Address |
IPv4 address in the IPv4SG binding. If no IP address is bound in the binding, this field displays N/A. |
MAC Address |
MAC address in the IPv4SG binding. If no MAC address is bound in the binding, this field displays N/A. |
Interface |
Interface of the binding. This field displays N/A for a global IPv4SG binding. |
VLAN |
VLAN information in the IPv4SG binding. If the binding contains no VLAN information, this field displays N/A. |
Type |
Type of the IPv4SG binding. WLAN snooping indicates that the IPv4SG binding is dynamically generated based on WLAN snooping. The binding is used by other modules to provide security services. |
Related commands
ip verify source
display ipv6 source binding
Use display ipv6 source binding to display IPv6SG bindings.
Syntax
display ipv6 source binding [ wlan-snooping ] [ ip-address ipv6-address ] [ mac-address mac-address ] [ vlan vlan-id ]
Views
Any view
Predefined user roles
network-admin
network-operator
Parameters
wlan-snooping: Specifies the WLAN snooping module.
ip-address ipv6-address: Specifies an IPv6 address.
mac-address mac-address: Specifies a MAC address in H-H-H format.
vlan vlan-id: Specifies a VLAN ID in the range of 1 to 4094.
interface interface-type interface-number: Specifies an interface by its type and number.
Examples
# Display all IPv6SG bindings on the public network.
<Sysname> display ipv6 source binding
Total entries found: 1
IPv6 Address MAC Address Interface VLAN Type
2012:1222:2012:1222: 000f-2202-0435 WLAN-BSS1/0/1 1 DHCPv6 snooping
2012:1222:2012:1222
Table 2 Command output
Field |
Description |
Total entries found |
Total number of IPv6SG bindings. |
IPv6 Address |
IPv6 address in the IPv6SG binding. If no IPv6 address is bound in the binding, this field displays N/A. |
MAC Address |
MAC address in the IPv6SG binding. If no MAC address is bound in the binding, this field displays N/A. |
Interface |
Interface of the IPv6SG binding. This field displays N/A for a global IPv6SG binding. |
VLAN |
VLAN information in the IPv6SG binding. If the binding contains no VLAN information, this field displays N/A. |
Type |
Type of the IPv6SG binding. WLAN snooping indicates that the IPv6SG binding is dynamically generated based on WLAN snooping. The binding is used by other modules to provide security services. |
Related commands
ipv6 verify source
ip verify source
Use ip verify source to enable the IPSG feature for IPv4.
Use undo ip verify source to disable the IPSG feature for IPv4.
Syntax
ip verify source
undo ip verify source
Default
The IPSG feature is disabled for IPv4.
Views
Service template view
Predefined user roles
network-admin
Usage guidelines
This feature uses WLAN snooping entries to filter IPv4 packets received by an AP. It drops packets that do not match the entries. A WLAN snooping entry is an IP-MAC binding.
In an IPv4 network, IPSG uses only the WLAN snooping entries obtained through DHCP packets.
Examples
# Enable the IPSG feature for IPv4.
<Sysname> system-view
[Sysname] wlan service-template security
[Sysname-wlan-st-security] ip verify source
ip verify unknown-ip
Use ip verify unknown-ip to configure the processing method for packets from unknown source IPv4 addresses received by APs.
Use undo ip verify unknown-ip to restore the default.
Syntax
ip verify unknown-ip { deauthenticate | drop }
undo ip verify unknown-ip
Default
An AP drops packets from unknown source IPv4 addresses.
Views
Service template view
Predefined user roles
network-admin
Parameters
deauthenticate: Drops packets from unknown source IPv4 addresses and sends deauthentication frames to the sources.
drop: Drops packets from unknown source IPv4 addresses only.
Usage guidelines
Unknown source IPv4 addresses refer to the following addresses:
· IPv4 addresses learned from ARP packets that are intercepted by APs.
· IPv4 addresses that have not been learned by APs.
This command is configurable only when the service template is disabled.
This command takes effect only when the IPSG feature is enabled for IPv4.
Examples
# Configure APs to drop packets from unknown source IPv4 addresses.
<Sysname> system-view
[Sysname] wlan service-template service1
[Sysname-wlan-st-service1] ip verify unknown-ip drop
ipv6 verify source
Use ipv6 verify source to enable the IPSG feature for IPv6.
Use undo ipv6 verify source to disable the IPSG feature for IPv6.
Syntax
ipv6 verify source
undo ipv6 verify source
Default
The IPSG feature is disabled for IPv6.
Views
Service template view
Predefined user roles
network-admin
Usage guidelines
This feature uses WLAN snooping entries to filter IPv6 packets received by an AP. It drops packets that do not match the entries. A WLAN snooping entry is an IP-MAC binding.
Examples
# Enable the IPSG feature for IPv6.
<Sysname> system-view
[Sysname] wlan service-template security
[Sysname-wlan-st-security] ipv6 verify source