H3C S10500 DHCP Snooping Configuration Examples



Similar documents
H3C SSL VPN RADIUS Authentication Configuration Example

H3C Firewall and UTM Devices DNS and NAT Configuration Examples (Comware V5)

How To Load Balance On A Libl Card On A S7503E With A Network Switch On A Server On A Network With A Pnet 2.5V2.5 (Vlan) On A Pbnet 2 (Vnet

Cisco - Configure the 1721 Router for VLANs Using a Switch Module (WIC-4ESW)

Configuring DHCP Snooping

Portal Authentication Technology White Paper

HP 5820X & 5800 Switch Series Layer 3 - IP Services. Configuration Guide. Abstract

HP 5120 SI Switch Series

Lab Configuring the PIX Firewall as a DHCP Server

IPS Attack Protection Configuration Example

CCNA Exploration: Accessing the WAN Chapter 7 Case Study

Security Technology White Paper

IPS Anti-Virus Configuration Example

Network Load Balancing

TFTP Firmware upgrade

Knowledgebase Solution

Optimum Business SIP Trunk Set-up Guide

Computer Networks I Laboratory Exercise 1

Chapter 25 DHCP Snooping

Skills Assessment Student Training Exam

Lab Configuring Access Policies and DMZ Settings

Setting up IP address distribution in a LAN

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

ITIS 2110 Lab 11: Domain Name Server. Tyler Everhart 11/12/2010

Lab - Using IOS CLI with Switch MAC Address Tables

Topic 7 DHCP and NAT. Networking BAsics.

Deploying Remote Desktop IP Virtualization Step-by-Step Guide

Exam 1 Review Questions

GS700TS FS700TS Access to the Internet on multiple VLANS using Multi- Homing

Configure IOS Catalyst Switches to Connect Cisco IP Phones Configuration Example

eztcp Technical Document Modbus/TCP of eztcp Caution: Specifications of this document may be changed without prior notice for improvement.

Packet Tracer - Subnetting Scenario 1 (Instructor Version)

Cisco Data Centre: Introducing Cisco Data Center Networking

What is VLAN Routing?

TotalCloud Phone System

Device Interface IP Address Subnet Mask Default Gateway

NetStream (Integrated) Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date

CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs

ASUS WL-5XX Series Wireless Router Internet Configuration. User s Guide

H3C SecPath UTM Series Anti-Spam Configuration Example

KNX IP Gateway. Light-Control R. User manual-ver.1 LC-IPGW-001. KNX Gateway. KNX/EIB Intelligent Installation Systems

Catalyst Layer 3 Switch for Wake On LAN Support Across VLANs Configuration Example

IP Addressing and Subnetting. 2002, Cisco Systems, Inc. All rights reserved.

Configuring the Beckhoff BK9000 Network Parameters

Abstract. MEP; Reviewed: GAK 10/17/2005. Solution & Interoperability Test Lab Application Notes 2005 Avaya Inc. All Rights Reserved.

UTM10 in multi-ssid, multi-vlan network with WMS5316. Network diagram

Digi Connect WAN Application Guide Using the Digi Connect WAN and Digi Connect VPN with a Wireless Router/Access Point

How To Configure InterVLAN Routing on Layer 3 Switches

How to Configure an Initial Installation of the VMware ESXi Hypervisor

H3C MSR Series Routers

Workstation ARP. Objective. Background / Preparation

Primary VLAN. This document shows how to view and change the primary VLAN for the HP Procurve Series 2500 Switches:

UCS iscsi Boot Configuration Example

AT-S41 Version Management Software for the AT-8326 and AT-8350 Series Fast Ethernet Switches. Software Release Notes

Configuring a customer owned router to function as a switch with Ultra TV

DHCP Server Port-Based Address Allocation

How to Create VLANs Within a Virtual Switch in VMware ESXi

H3C SSL VPN Configuration Examples

bintec Workshop WAN Partner Configuration Copyright November 8, 2005 Funkwerk Enterprise Communications GmbH Version 0.9

Session Title: Exploring Packet Tracer v5.3 IP Telephony & CME. Scenario

User manual Remote access VNC V 0.2

NETGEAR ProSAFE WC9500 High Capacity Wireless Controller

ezvsp User's Manual ( Version 2.1d ) Sollae Systems Co., Ltd.

Table of Contents 1 IP Addressing Configuration 1-1

FSM73xx GSM73xx GMS72xxR Shared access to the Internet across Multiple routing VLANs using a Prosafe Firewall

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Lab Organizing CCENT Objectives by OSI Layer

MaxSea TimeZero NN3D Radar Connection Checklist

AudiaFLEX Voice-over-IP Interface. Preliminary Steps. Configuring a Cisco CallManager system to work with Biamp s VoIP-2 card

Installing Intercloud Fabric Firewall

White Paper Copyright 2011 Nomadix, Inc. All Rights Reserved. Thursday, January 05, 2012

Quick Installation Guide Network Management Card

Bercut-ETL Ethernet/Gigabit Ethernet loopback

Configuring H.323 over Port Network Address Translation (PNAT) for Avaya IP Endpoints using the Avaya SG200 Security Gateway - Issue 1.

How To Load Balance On A Cisco Cisco Cs3.X With A Csono Css 3.X And Csonos 3.5.X (Cisco Css) On A Powerline With A Powerpack (C

Investigation of DHCP Packets using Wireshark

ProSafe Plus Switch Utility

Relaying DHCP Packets to a Remote Server

AT-S84 Version ( ) Management Software for the AT-9000/24 Gigabit Ethernet Switch Software Release Notes

Lab 3.5.1: Basic VLAN Configuration (Instructor Version)

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version Rev.

: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)

Configuring DHCP Snooping and IP Source Guard

IP Link Best Practices for Network Integration and Security. Introduction...2. Passwords...4 ACL...5 VLAN...6. Protocols...6. Conclusion...

CT5760 Controller and Catalyst 3850 Switch Configuration Example

M2M Series Routers. Virtual Router Redundancy Protocol (VRRP) Configuration Whitepaper

Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance

Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide. Revised February 28, :32 pm Pacific

SSL (Secure Socket Layer)

Integration with IP Phones

Setting up VPN Access for Remote Diagnostics Support

1 PC to WX64 direction connection with crossover cable or hub/switch

DG Forwarding Algorithm

Command Manual - Network Protocol Quidway S3000 Series Ethernet Switches. Table of Contents

Application Notes for Lucent Technologies VitalQIP DHCP/DNS Management with Avaya IP Telephones and Avaya Communication Manager Issue 1.

BASIC ANALYSIS OF TCP/IP NETWORKS

AC 800M. EtherNet/IP DeviceNet Linking Device LD 800DN. Power and productivity for a better world TM SP1134

Transcription:

H3C S10500 DHCP Snooping Configuration Examples Copyright 2015 Hangzhou H3C Technologies Co., Ltd. All rights reserved. No part of this manual may be reproduced or transmitted in any form or by any means without prior written consent of Hangzhou H3C Technologies Co., Ltd. The information in this document is subject to change without notice.

Contents Introduction 1 Prerequisites 1 Example: Configuring 1 Network requirements 1 Requirements analysis 2 Software version used 2 Configuration restrictions and guidelines 2 Configuration procedures 3 Configuring Device A 3 Configuring Device B 3 Configuring Device C 4 Configuring Device D 4 Configuration files 6 Related documentation 8 i

Introduction This document provides configuration examples. Prerequisites The configuration examples in this document were created and verified in a lab environment, and all the devices were started with the factory default configuration. When you are working on a live network, make sure you understand the potential impact of every command on your network. This document assumes that you have basic knowledge of DHCP. Example: Configuring Network requirements As shown infigure 1, three groups of hosts are connected to the DHCP server through the DHCP snooping devices. Configure and DHCP server to meet the following requirements: Hosts in each group obtain IP addresses from the address range assigned to the group. Assign address ranges to the groups as follows: Address range 192.168.0.2 to 192.168.0.39 for Group 1. Address range 192.168.0.40 to 192.168.0.99 for Group 2. Address range 192.168.0.100 to 192.168.0.200 for Group 3. The hosts can obtain IP addresses only from the authorized DHCP server. The hosts cannot access the network through IP addresses that are manually configured. Figure 1 Network diagram Unauthorized DHCP server Device A GE2/0/2 GE2/0/4 GE2/0/2 Vlan-int2 192.168.0.1 Group1 Device C DHCP server Device D Group2 GE2/0/4 GE2/0/2 Device B Group3 1

Requirements analysis To meet the network requirements, you must perform the following tasks: To make sure the hosts in each group obtain IP addresses from the address range assigned to the group, perform the following tasks: Configure Option 82 on the devices. Create DHCP user classes for the groups and configure match rules based on Option 82 to match the groups on the DHCP server. To make sure the hosts obtain addresses only from the authorized DHCP server, configure ports facing the server as trusted and other ports as untrusted, as shown in Figure 2. To prevent illegal users from using manually configured IP addresses to access the network, perform the following tasks: Enable ARP detection in the VLANs where the groups reside to check user validity based on entries. Enable recording of client information in entries. To save system resources, you can enable only untrusted ports directly connected to hosts to record entries, as shown in Figure 2. Figure 2 Trusted and untrusted ports Unauthorized DHCP server Device A GE2/0/2 GE2/0/4 GE2/0/2 Vlan-int2 192.168.0.1 Group1 Device C DHCP server Device D GE2/0/4 Group2 GE2/0/2 Device B Group3 Untrusted ports enabled to record snooping entries Untrusted ports disabled from recording snooping entries Trusted ports Software version used This configuration example was created and verified on S10500-CMW710-R7150. Configuration restrictions and guidelines To ensure correct DHCP address allocation by using Option 82, you must perform Option 82 configuration on both the DHCP server and the devices. 2

Configuration procedures Configuring Device A Enable. <DeviceA> system-view [DeviceA] dhcp snooping enable Enable recording of client information in entries on interface GigabitEthernet 1/0/1. [DeviceA] interface GigabitEthernet 1/0/1 [DeviceA-GigabitEthernet1/0/1] dhcp snooping binding record Enable to support Option 82 on interface GigabitEthernet 1/0/1. Configure the padding content for the Circuit ID sub-option as group1. [DeviceA-GigabitEthernet1/0/1] dhcp snooping information enable [DeviceA-GigabitEthernet1/0/1] dhcp snooping information circuit-id string group1 [DeviceA-GigabitEthernet1/0/1] quit Configure interface GigabitEthernet 1/0/2 as a trusted port. By default, an interface is an untrusted port. [DeviceA] interface GigabitEthernet 1/0/2 [DeviceA-GigabitEthernet1/0/2] dhcp snooping trust [DeviceA-GigabitEthernet1/0/2] quit Enable ARP detection for user validity check. [DeviceA] vlan 1 [DeviceA-vlan1] arp detection enable [DeviceA-vlan1] quit Configure interface GigabitEthernet 1/0/2 as an ARP trusted port. By default, an interface is an ARP untrusted port. [DeviceA] interface GigabitEthernet 1/0/2 [DeviceA-GigabitEthernet1/0/2] arp detection trust [DeviceA-GigabitEthernet1/0/2] quit Configuring Device B Enable. <DeviceB> system-view [DeviceB] dhcp snooping enable Enable recording of client information in entries on interface GigabitEthernet 1/0/1. [DeviceB] interface GigabitEthernet 1/0/1 [DeviceB-GigabitEthernet1/0/1] dhcp snooping binding record Enable to support Option 82 on interface GigabitEthernet 1/0/1. Configure the padding content for the Circuit ID sub-option as group2. [DeviceB-GigabitEthernet1/0/1] dhcp snooping information enable [DeviceB-GigabitEthernet1/0/1] dhcp snooping information circuit-id string group2 3

[DeviceB-GigabitEthernet1/0/1] quit Configure interface GigabitEthernet 1/0/2 as a trusted port. By default, an interface is an untrusted port. [DeviceB] interface GigabitEthernet 1/0/2 [DeviceB-GigabitEthernet1/0/2] dhcp snooping trust [DeviceB-GigabitEthernet1/0/2] quit Enable recording of client information in entries on interface GigabitEthernet 1/0/3. [DeviceB] interface GigabitEthernet 1/0/3 [DeviceB-GigabitEthernet1/0/3] dhcp snooping binding record Enable to support Option 82 on interface GigabitEthernet 1/0/3. Configure the padding content for the Circuit ID sub-option as group3. [DeviceB-GigabitEthernet1/0/3] dhcp snooping information enable [DeviceB-GigabitEthernet1/0/3] dhcp snooping information circuit-id string group3 [DeviceB-GigabitEthernet1/0/3] quit Enable ARP detection for user validity check. [DeviceB] vlan 1 [DeviceB-vlan1] arp detection enable [DeviceB-vlan1] quit Configure interface GigabitEthernet 1/0/2 as an ARP trusted port. By default, an interface is an ARP untrusted port. [DeviceB] interface GigabitEthernet 1/0/2 [DeviceB-GigabitEthernet1/0/2] arp detection trust [DeviceB-GigabitEthernet1/0/2] quit Configuring Device C Enable. <DeviceC> system-view [DeviceC] dhcp snooping enable Configure interface GigabitEthernet 1/0/2 as a trusted port. By default, an interface is an untrusted port. [DeviceC] interface GigabitEthernet 1/0/2 [DeviceC-GigabitEthernet1/0/2] dhcp snooping trust [DeviceC-GigabitEthernet1/0/2] quit Configuring Device D Assign interface GigabitEthernet 1/0/1 to VLAN 2. <DeviceD> system-view [DeviceD] vlan 2 [DeviceD-vlan2] port GigabitEthernet 1/0/1 [DeviceD-vlan2] quit Assign an IP address to VLAN-interface 2. [DeviceD] interface Vlan-interface 2 4

[DeviceD-Vlan-interface2] ip address 192.168.0.1 24 [DeviceD-Vlan-interface2] quit Enable DHCP. [DeviceD] dhcp enable Enable DHCP server on VLAN-interface 2. [DeviceD] interface vlan-interface 2 [DeviceD-Vlan-interface2] dhcp select server [DeviceD-Vlan-interface2] quit Create DHCP user class group1 for hosts in Group 1. Configure match rule 1 to match DHCP requests in which the third to eighth bytes of Option 82 is 0x67726F757031. The string 0x67726F757031 indicates that the content of the Circuit ID sub-option is group1. [DeviceD] dhcp class group1 [DeviceD-dhcp-class-group1] if-match rule 1 option 82 hex 67726F757031 offset 2 length 6 [DeviceD-dhcp-class-group1] quit Create DHCP user class group2 for hosts in Group 2. Configure match rule 1 to match DHCP requests in which the third to eighth bytes of Option 82 is 0x67726F757032. The string 0x67726F757032 indicates that the content of the Circuit ID sub-option is group2. [DeviceD] dhcp class group2 [DeviceD-dhcp-class-group2] if-match rule 1 option 82 hex 67726F757032 offset 2 length 6 [DeviceD-dhcp-class-group2] quit Create DHCP user class group3 for hosts in Group 3. Configure match rule 1 to match DHCP requests in which the third to eighth bytes of Option 82 is 0x67726F757033. The string 0x67726F757033 indicates that the content of the Circuit ID sub-option is group3. [DeviceD] dhcp class group3 [DeviceD-dhcp-class-group3] if-match rule 1 option 82 hex 67726F757033 offset 2 length 6 [DeviceD-dhcp-class-group3] quit Create a DHCP address pool. [DeviceD] dhcp server ip-pool 1 Specify the subnet for dynamic address allocation. [DeviceD-dhcp-pool-1] network 192.168.0.0 mask 255.255.255.0 Specify address range 192.168.0.2 to 192.168.0.39 for DHCP user class group1. [DeviceD-dhcp-pool-1] class group1 range 192.168.0.2 192.168.0.39 Specify address range 192.168.0.40 to 192.168.0.99 for DHCP user class group2. [DeviceD-dhcp-pool-1] class group2 range 192.168.0.40 192.168.0.99 Specify address range 192.168.0.100 to 192.168.0.200 for DHCP user class group3. [DeviceD-dhcp-pool-1] class group3 range 192.168.0.100 192.168.0.200 Apply the DHCP address pool to VLAN-interface 2. [DeviceD] interface Vlan-interface 2 [DeviceD-Vlan-interface2] dhcp server apply ip-pool 1 [DeviceD-Vlan-interface2] quit Verifying the configuration 5

Verify that the hosts in each group can obtain IP addresses from the address range assigned to the group. This example uses a host in Group 2 to verify the configuration. C:\Documents and Settings\Administrator>ipconfig Windows IP Configuration Ethernet adapter bb: Connection-specific DNS Suffix. : IP Address............ : 192.168.0.44 Subnet Mask........... : 255.255.255.0 Default Gateway......... : Manually assign IP address 192.168.0.66 to a host in Group 2, and verify that it cannot access the external network. (Details not shown.) Configuration files Device A: dhcp snooping enable vlan 1 arp detection enable interface GigabitEthernet1/0/1 dhcp snooping binding record dhcp snooping information enable dhcp snooping information circuit-id string group1 interface GigabitEthernet1/0/2 arp detection trust dhcp snooping trust Device B: dhcp snooping enable vlan 1 arp detection enable interface GigabitEthernet1/0/1 dhcp snooping binding record dhcp snooping information enable 6

dhcp snooping information circuit-id string group2 interface GigabitEthernet1/0/2 arp detection trust dhcp snooping trust interface GigabitEthernet1/0/3 dhcp snooping binding record dhcp snooping information enable dhcp snooping information circuit-id string group3 Device C: dhcp snooping enable interface GigabitEthernet1/0/2 dhcp snooping trust Device D: dhcp enable vlan 2 dhcp class group1 if-match rule 1 option 82 hex 67726f757031 offset 2 length 6 dhcp class group2 if-match rule 1 option 82 hex 67726f757032 offset 2 length 6 dhcp class group3 if-match rule 1 option 82 hex 67726f757033 offset 2 length 6 dhcp server ip-pool 1 network 192.168.0.0 mask 255.255.255.0 class group1 range 192.168.0.2 192.168.0.39 class group2 range 192.168.0.40 192.168.0.99 class group3 range 192.168.0.100 192.168.0.200 interface Vlan-interface2 ip address 192.168.0.1 255.255.255.0 dhcp server apply ip-pool 1 interface GigabitEthernet1/0/1 7

port access vlan 2 Related documentation H3C S10500 Switch Series Layer 3 IP Services Configuration Guide-Release 7150 H3C S10500 Switch Series Layer 3 IP Services Command Reference-Release 7150 8