Enterprise Network Cisco switch DHCP snooping and IP source guard prohibit manual IP configuration

Source: Internet
Author: User
Tags cisco switch

Network topology structure:

Scenario Description:

Core layer: Each VLAN interface gateway is at the core layer
Aggregation layer: Two stacks, port-channel to the core layer, Port-channel Xia Lian to the access layer, do not run dynamic routing
Access layer: Two port Port-channel, link to two aggregation switches respectively

Objective:
Prevent internal enterprise network from accessing DHCP server through DHCP snooping;
Prevent internal users from manually configuring IP addresses by enabling IP source guard.

Access Layer DHCP snooping configuration:

2F-NEW-ACC-SW-1(config)#ip dhcp snooping2F-NEW-ACC-SW-1(config)# ip dhcp snooping vlan 242F-NEW-ACC-SW-1(config)# ip dhcp snooping vlan 252F-NEW-ACC-SW-1(config)#interface GigabitEthernet1/0/472F-NEW-ACC-SW-1(config-if)#ip dhcp snooping trust2F-NEW-ACC-SW-1(config)#interface GigabitEthernet1/0/482F-NEW-ACC-SW-1(config-if)#ip dhcp snooping trust2F-NEW-ACC-SW-1(config)#interface Po12F-NEW-ACC-SW-1(config-if)#ip dhcp snooping trust

The core layer needs to be configured as follows: (otherwise the client gets no IP address)

6S-CORE-SW-1(config)#interface vlan 246S-CORE-SW-1(config)# ip dhcp relay information trusted6S-CORE-SW-1(config)#interface vlan 256S-CORE-SW-1(config)# ip dhcp relay information trusted

Look at the effect:

2F-NEW-ACC-SW-1#SH IP DHCP snoopingswitch DHCP snooping is enabledswitch DHCP gleaning are disableddhcp snooping is Configu Red on following VLANS:24-25DHCP snooping are operational on following VLANS:24-25DHCP snooping are configured on the follow  ing L3 interfaces:insertion of option is enabled Circuit-id default Format:vlan-mod-port remote-id:50f7.22c7.8d00 (MAC) Option untrusted port is not allowedverification of hwaddr field was enabledverification of giaddr field is ENABLEDDH CP snooping Trust/rate is configured on the following Interfaces:interface Trusted allow option Rat E limit (PPS)----------------------------------------------------------gigabitethernet1/0/47 Yes y Es Unlimited Custom circuit-ids:gigabitethernet1/0/48 Yes unlimited custom Circu    It-ids:port-channel1 Yes unlimitedinterface Trusted allow option Rate Limit (PPS)----------------------------------------------------------Custom circuit-ids:2f-new-acc-sw-1#sh ip dhcp Snoo Ping bindingmacaddress IpAddress Lease (sec) Type VLAN Interface----------------------------                                                                                        -----  ----------  -------------  ----  ----------                                                                                        ----------2C:60:0C:73:EA:FC 172.16.24.17 688869 dhcp-snooping gigabitet Hernet1/0/1700:0b:82:86:10:35 172.16.24.136 6                                                                                        09318 dhcp-snooping Gigabitet                                                                                        hernet1/0/20a8:1e:84:a6:74:7e 172.16.25.12 690293 dhcp-snooping gigabitet      HERNET1/0/301C:39:47:E4:7D:1D 172.16.25.11 688206 Dhcp-snooping 25   Gigabitet hernet1/0/28a4:4c:c8:1                                                                                        0:63:ee 172.16.24.150 688220 dhcp-snooping gigabitet HERNET1/0/71C:39:47:E3:5C:C3 172.16.25.14 690459 dhcp-snooping Giga    Bitet hernet1/0/29d4:81:d7:ff:04:08                                                                                        172.16.24.33 684055 dhcp-snooping Gigabitet                                                                                        Hernet1/0/15a8:60:b6:2e:c7:a9 172.16.25.127 690215 dhcp-snooping gigabitet HERNET1/0/44A8:60:B6:38:2F:A9 172                                                                                        .16.25.132 689510 dhcp-snooping Gigabitet Hernet1/0/43f0:76:1c:e2:64:4c 172.16.25.10 689447 dhcp-snooping gigabitet Hernet1/0/34--more--

IP Source Guard Configuration:
IP Souce Guard requires DHCP snooping, so DHCP snooping must be enabled before IP source guard is configured.
The Ip Source Guard configuration is simple and can only be enabled under the corresponding interface:

2F-NEW-ACC-SW-1(config)#interface gigabitEthernet 1/0/12F-NEW-ACC-SW-1(config-if)#switchport port-security2F-NEW-ACC-SW-1(config-if)#ip verify source port-security

Look at the effect:

2f-new-acc-sw-1#sh IP ver sourceinterface filter-type filter-mode ip-address mac-address Vlan-----------    --------------------------------------------------------GI1/0/1 Ip-mac INACTIVE-NO-SNOOPING-VLANGI1/0/2     Ip-mac Active Deny-all deny-all 24GI1/0/3 Ip-mac INACTIVE-NO-SNOOPING-VLANGI1/0/4         Ip-mac Active Deny-all deny-all 24GI1/0/5 Ip-mac Active Deny-all Deny-all 24GI1/0/6 Ip-mac Active deny-all deny-all 24GI1/0/7 ip-mac AC       tive 172.16.24.150 a4:4c:c8:10:63:ee 24gi1/0/8 ip-mac INACTIVE-NO-SNOOPING-VLANGI1/0/9 Ip-mac       Active Deny-all deny-all 24GI1/0/10 ip-mac INACTIVE-NO-SNOOPING-VLANGI1/0/11 Ip-mac           Active Deny-all Deny-all 24GI1/0/12 ip-mac active Deny-all Deny-all 24GI1/0/13 Ip-mac      Active Deny-all deny-all 24GI1/0/14 ip-mac inactive-no-snooping-vlangi1/0/15 ip-ma C Active 172.16.24.33 d4:81:d7:ff:04:08 24gi1/0/16 ip-mac inactive-no-snooping-vlangi1/0/17 ip- Mac active 172.16.24.17 2c:60:0c:73:ea:fc 24gi1/0/18 ip-mac inactive-no-snooping-vlangi1/0/19 I P-mac inactive-no-snooping-vlangi1/0/20 Ip-mac Active 172.16.24.136 00:0b:82:86:10:35 24

Filter mode: All active states
In the IP address column, the normal IP is displayed, and the Deny-all may be manually configured IP address.

Enterprise Network Cisco switch DHCP snooping and IP source guard prohibit manual IP configuration

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.