• <ruby id="5koa6"></ruby>
    <ruby id="5koa6"><option id="5koa6"><thead id="5koa6"></thead></option></ruby>

    <progress id="5koa6"></progress>

  • <strong id="5koa6"></strong>
    • 軟件測試技術
    • 軟件測試博客
    • 軟件測試視頻
    • 開源軟件測試技術
    • 軟件測試論壇
    • 軟件測試沙龍
    • 軟件測試資料下載
    • 軟件測試雜志
    • 軟件測試人才招聘
      暫時沒有公告

    字號: | 推薦給好友 上一篇 | 下一篇

    解決IP地址沖突的完美方法--DHCP SNOOPING

    發布: 2007-6-23 21:39 | 作者:   | 來源:   | 查看: 229次 | 進入軟件測試論壇討論

    領測軟件測試網

       

    使用的方法是采用DHCP方式為用戶分配IP,然后限定這些用戶只能使用動態IP的方式,如果改成靜態IP的方式則不能連接上網絡;也就是使用了DHCP SNOOPING功能。
    例子:
    version 12.1
    no service pad
    service timestamps debug uptime
    service timestamps log uptime
    no service password-encryption
    service compress-config
    !
    hostname C4-2_4506
    !
    enable password xxxxxxx!
    clock timezone GMT 8
    ip su.net-zero


    no ip domain-lookup
    !
    ip dhcp snooping vlan 180-181 // 對哪些VLAN 進行限制
    ip dhcp snooping
    ip arp inspection vlan 180-181
    ip arp inspection validate src-mac dst-mac ip




    errdisable recovery cause udld
    errdisable recovery cause bpduguard
    errdisable recovery cause security-violation
    errdisable recovery cause channel-misconfig
    errdisable recovery cause pagp-flap
    errdisable recovery cause dtp-flap
    errdisable recovery cause link-flap
    errdisable recovery cause l2ptguard
    errdisable recovery cause psecure-violation
    errdisable recovery cause gbic-invalid
    errdisable recovery cause dhcp-rate-limit
    errdisable recovery cause unicast-flood
    errdisable recovery cause vmps
    errdisable recovery cause arp-inspection
    errdisable recovery interval 30
    spanning-tree extend system-id
    !
    !

    interface GigabitEthernet2/1 // 對該端口接入的用戶進行限制,可以下聯交換機
    ip arp inspection limit rate 100
    arp timeout 2
    ip dhcp snooping limit rate 100
    !



    interface GigabitEthernet2/2
    ip arp inspection limit rate 100
    arp timeout 2
    ip dhcp snooping limit rate 100
    !
    interface GigabitEthernet2/3
    ip arp inspection limit rate 100
    arp timeout 2
    ip dhcp snooping limit rate 100
    !
    interface GigabitEthernet2/4
    ip arp inspection limit rate 100
    arp timeout 2
    ip dhcp snooping limit rate 100
    --More--

    編者注:對不需要明確地址的所有人的時候是一個很好的解決辦法。另外,可以查看www.cisco.com的
    IP Source Guard
    Similar to DHCP snooping, this feature is enabled on a DHCP snooping untrusted Layer 2 port. Initially, all IP traffic on the port is blocked except for DHCP packets that are captured by the DHCP snooping process. When a client receives a valid IP address from the DHCP server, or when a static IP source binding is configured by the user, a per-port and VLAN Access Control List (PACL) is installed on the port. This process restricts the client IP traffic to those source IP addresses configured in the binding; any IP traffic with a source IP address other than that in the IP source binding will be filtered out. This filtering limits a host's ability to attack the network by claiming neighbor host's IP address.

    延伸閱讀

    文章來源于領測軟件測試網 http://www.kjueaiud.com/


    關于領測軟件測試網 | 領測軟件測試網合作伙伴 | 廣告服務 | 投稿指南 | 聯系我們 | 網站地圖 | 友情鏈接
    版權所有(C) 2003-2010 TestAge(領測軟件測試網)|領測國際科技(北京)有限公司|軟件測試工程師培訓網 All Rights Reserved
    北京市海淀區中關村南大街9號北京理工科技大廈1402室 京ICP備2023014753號-2
    技術支持和業務聯系:info@testage.com.cn 電話:010-51297073

    軟件測試 | 領測國際ISTQBISTQB官網TMMiTMMi認證國際軟件測試工程師認證領測軟件測試網

    老湿亚洲永久精品ww47香蕉图片_日韩欧美中文字幕北美法律_国产AV永久无码天堂影院_久久婷婷综合色丁香五月

  • <ruby id="5koa6"></ruby>
    <ruby id="5koa6"><option id="5koa6"><thead id="5koa6"></thead></option></ruby>

    <progress id="5koa6"></progress>

  • <strong id="5koa6"></strong>