03-Security Configuration Guide

HomeSupportSecurityH3C SecPath F5000 FirewallConfigure & DeployConfiguration GuidesH3C SecPath F50X0-D[F5000-AK] Firewalls Series Configuration Guides (V7) (R9620)-6W40103-Security Configuration Guide
24-IP-MAC binding configuration
Title Size Download
24-IP-MAC binding configuration 133.97 KB

Configuring IP-MAC binding

About IP-MAC binding

The device prevents user spoofing attacks by using an IP-MAC binding table to filter out illegitimate packets with forged source IP addresses or MAC addresses.

Operating mechanism

The IP-MAC binding table contains binding entries that bind IP addresses and MAC addresses. The device uses the binding entries to match an incoming packet.

As shown in Figure 1, all hosts communicate with the IP network through the device. When the device receives a packet, it compares the source IP address and source MAC address in the packet with the IP-MAC binding entries. Table 1 describes the way the device processes the packet based on the match result.

Figure 1 IP-MAC binding application scenario

 

Table 1 Processing of a packet based on the match result

Match result

Processing of the packet

The packet source IP address and source MAC address match the same IP-MAC binding entry.

Permits the packet.

Only the source IP address or source MAC address matches a binding entry.

Drops the packet.

The source IP address and source MAC address match two different binding entries.

Drops the packet.

Both the source IP address and the source MAC address of a packet match no IP-MAC binding entry.

Processes the packet based on the default action.

By default, the device permits all packets that do not match any binding entries. You can use the ip-mac binding no-match action deny command to set the default action to deny.

 

IP-MAC binding entry creation

An IP-MAC binding entry binds an IP address to a MAC address. You can manually create IP-MAC binding entries one by one or generate them in bulk. All binding entries are globally effective.

Manual creation of IP-MAC binding entries

This method is applicable only to networks that do not contain many hosts and in which the hosts are statically assigned IP addresses.

Bulk generation of IP-MAC binding entries

This method is applicable to networks that contain many hosts.

This method allows a device to generate IPv4-MAC binding entries based on ARP entries and create IPv6-MAC binding entries based on ND entries on an interface.

The device generates an IP-MAC binding entry based on an ARP or ND entry as follows:

·     If neither the IP address nor the MAC address in the ARP/ND entry exists in the binding table, the device generates a new binding entry. In this situation, the IP address and the MAC address are uniquely bound to each other.

·     If the MAC address in the ARP/ND entry exists in the binding table but the IP address does not, the device generates a new binding entry. In this situation, the MAC address is bound to multiple IP addresses.

·     If the IP address in the ARP/ND entry exists in the binding table, the device will not generate a new binding entry. This is because an IP address can be bound to only one MAC address.

IP-MAC binding entries generated based on ARP and ND entries are static. Therefore, the binding entries are not updated when the relevant ARP or ND entries change.

Restrictions and guidelines: IP-MAC binding configuration

IP-MAC binding entries are static. Therefore, the IP-MAC binding feature is applicable only to networks where all users are statically assigned IP addresses. Using this feature in a network where all users' IP addresses are dynamically assigned through DHCP might cause communication failure.

A MAC address can be bound to multiple IP addresses. To bind a MAC address in a binding entry to another IP address, use the MAC address and new IP address to create a new binding entry. You can choose to delete the existing binding entry or retain it. An IP address can be bound to only one MAC address. To bind an IP address in a binding entry to another MAC address, you must delete the existing binding entry and then create the new one.

IP-MAC binding tasks at a glance

To configure IP-MAC binding, perform the following tasks:

1.     Enabling the IP-MAC binding feature on an interface

2.     Configuring IP-MAC binding entries

Choose the options to configure as needed:

¡     Manually creating an IP-MAC binding entry

¡     Bulk generating IP-MAC binding entries

3.     Setting the default action for packets that do not match any IP-MAC binding entries

Enabling the IP-MAC binding feature on an interface

About this task

When this feature is enabled on an interface, the device compares the source IP address and source MAC address in incoming packets of the interface with existing IP-MAC binding entries. The packets that do not exactly match any IP-MAC binding entries are dropped.

Procedure

1.     Enter system view.

system-view

2.     Enter interface view.

interface interface-type interface-number

3.     Enable the IP-MAC binding feature on the interface.

ip-mac binding enable

By default, the IP-MAC binding feature is disabled on an interface.

Manually creating an IP-MAC binding entry

Creating an IP-MAC binding entry

1.     Enter system view.

system-view

2.     Create an IP-MAC binding entry.

IPv4:

ip-mac binding ipv4 ipv4-address mac-address mac-address [ vlan vlan-id | vpn-instance vpn-instance-name ]

IPv6:

ip-mac binding ipv6 ipv6-address mac-address mac-address [ vlan vlan-id | vpn-instance vpn-instance-name ]

By default, no IP-MAC binding entry is configured.

Bulk generating IP-MAC binding entries

About this task

This task allows the device to generate IP-MAC binding entries in bulk based on existing ARP and ND entries on an interface.

Procedure

1.     Enter system view.

system-view

2.     Bulk generate IP-MAC binding entries.

ip-mac binding interface interface-type interface-number

Setting the default action for packets that do not match any IP-MAC binding entries

About this task

By default, the device permits packets that do not match any IP-MAC binding entries to pass through. This task allows you to set the default action to deny for these packets.

Procedure

1.     Enter system view.

system-view

2.     Set the default action to deny for packets that do not match any IP-MAC binding entries.

ip-mac binding no-match action deny

By default, the action for packets that do not match any IP-MAC binding entries is permit.

Display and maintenance commands for IP-MAC binding

Execute display commands in any view and reset commands in user view.

 

Task

Command

Display IPv4-MAC binding entries.

display ip-mac binding ipv4 [ ipv4-address ] [ mac-address mac-address ] [ vlan vlan-id | vpn-instance vpn-instance-name ]

Display IPv6-MAC binding entries.

display ip-mac binding ipv6 [ ipv6-address ] [ mac-address mac-address ] [ vlan vlan-id | vpn-instance vpn-instance-name ]

Display statistics about packets dropped by the IP-MAC binding feature.

display ip-mac binding statistics [ chassis chassis-number slot slot-number ]

Display the status of the IP-MAC binding feature.

display ip-mac binding status

Clear statistics about packets dropped by the IP-MAC binding feature.

reset ip-mac binding statistics [ chassis chassis-number slot slot-number ]

 

IP-MAC binding configuration examples

Example: Configuring IPv4-MAC binding

Network configuration

As shown in Figure 2, Host A, Host B, and the server are statically assigned IPv4 addresses. Host A and Host B communicate with the server through the gateway (the device).

Create the following IPv4-MAC binding entries on the device to permit packets only from Host A, Host B, and the server:

·     Bind IPv4 address 192.168.0.1 to MAC address 0001-0203-0404 for Host A.

·     Bind IPv4 address 192.168.0.2 to MAC address 0001-0203-0405 for Host B.

·     Bind IPv4 address 192.168.1.3 to MAC address 0001-0203-0407 for the server.

Figure 2 Network diagram

Procedure

# Assign IP addresses to interfaces and configure routes, security zones, zone pairs, and interzone policies. Make sure the network connections are available. (Details not shown.)

# Enable the IP-MAC binding feature on GigabitEthernet 1/2/5/1 and GigabitEthernet 1/2/5/2.

<Device> system-view

[Device] interface gigabitethernet 1/2/5/1

[Device-GigabitEthernet1/2/5/1] ip-mac binding enable

[Device-GigabitEthernet1/2/5/1] quit

[Device] interface gigabitethernet 1/2/5/2

[Device-GigabitEthernet1/2/5/2] ip-mac binding enable

[Device-GigabitEthernet1/2/5/2] quit

# Create IPv4-MAC binding entries to permit packets only from Host A, Host B, and the server.

[Device] ip-mac binding ip 192.168.0.1 mac-address 0001-0203-0404

[Device] ip-mac binding ip 192.168.0.2 mac-address 0001-0203-0405

[Device] ip-mac binding ip 192.168.1.3 mac-address 0001-0203-0407

# Set the default action to deny for packets that do not match any IP-MAC binding entries.

[Device] ip-mac binding no-match action deny

Verifying the configuration

# Display IPv4-MAC binding entries.

<Device> display ip-mac binding ipv4

Total entries: 1

IP address      MAC address         VPN instance         VLAN ID

192.168.0.1     0001-0203-0404      public               N/A

192.168.0.2     0001-0203-0405      public               N/A

192.168.1.3     0001-0203-0407      public               N/A

# Ping the server from Host C.

C:\> ping 192.168.1.3

 

Pinging 192.168.1.3 with 32 bytes of data:

 

Request timed out.

Request timed out.

Request timed out.

Request timed out.

 

Ping statistics for 192.168.1.3:

   Packets: Sent = 4, Received = 0, Lost = 4 (100% loss),

The ping requests timed out, which indicates that the requests are blocked by the device.

Example: Configuring IPv6-MAC binding

Network configuration

As shown in Figure 3, Host A, Host B, and the server are statically assigned IPv6 addresses. Host A and Host B communicate with the server through the gateway (the device).

Create the following IPv6-MAC binding entries on the device to permit packets only from Host A, Host B, and the server:

·     Bind IPv6 address 2000::1/64 to MAC address 0001-0203-0404 for Host A.

·     Bind IPv6 address 2000::2/64 to MAC address 0001-0203-0405 for Host B.

·     Bind IPv6 address 2001::3/64 to MAC address 0001-0203-0407 for the server.

Figure 3 Network diagram

Procedure

# Assign IP addresses to interfaces and configure routes, security zones, zone pairs, and interzone policies. Make sure the network connections are available. (Details not shown.)

# Enable the IP-MAC binding feature on GigabitEthernet 1/2/5/1 and GigabitEthernet 1/2/5/2.

<Device> system-view

[Device] interface gigabitethernet 1/2/5/1

[Device-GigabitEthernet1/2/5/1] ip-mac binding enable

[Device-GigabitEthernet1/2/5/1] quit

[Device] interface gigabitethernet 1/2/5/2

[Device-GigabitEthernet1/2/5/2] ip-mac binding enable

[Device-GigabitEthernet1/2/5/2] quit

# Create IPv6-MAC binding entries to permit packets only from Host A, Host B, and the server.

[Device] ip-mac binding ipv6 2000::1 mac-address 0001-0203-0404

[Device] ip-mac binding ipv6 2000::2 mac-address 0001-0203-0405

[Device] ip-mac binding ipv6 2001::3 mac-address 0001-0203-0407

# Set the default action to deny for packets that do not match any IP-MAC binding entries.

[Device] ip-mac binding no-match action deny

Verifying the configuration

# Display IPv6-MAC binding entries.

<Device> display ip-mac binding ipv6

Total entries: 1

IP address      MAC address         VPN instance         VLAN ID

2000::1         0001-0203-0404      public               N/A

2000::2         0001-0203-0405      public               N/A

2001::3         0001-0203-0407      public               N/A

# Ping the server from Host C.

C:\> ping 2001::3

 

Pinging 2001::3 with 32 bytes of data:

 

Request timed out.

Request timed out.

Request timed out.

Request timed out.

 

Ping statistics for 2001::3:

   Packets: Sent = 4, Received = 0, Lost = 4 (100% loss),

The ping requests timed out, which indicates that the requests are blocked by the device.

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
All Support
  • Become A Partner
  • Partner Policy & Program
  • Global Learning
  • Partner Sales Resources
  • Partner Business Management
  • Service Business
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网