ARP restricted forwarding configuration example

Network requirements

As shown in Figure 206, configure ARP restricted forwarding on Router B where ARP attack detection is configured. Port isolation configured on Router B can take effect for broadcast ARP requests.

Figure 201: Network diagram

Configuration procedure

  1. Configure VLAN 10, add interfaces to VLAN 10, and specify the IP address of the VLAN interface. (Details not shown.)

  2. Configure the DHCP server on Router A, and configure DHCP address pool 0.

    <RouterA> system-view
    [RouterA] dhcp enable
    [RouterA] dhcp server ip-pool 0
    [RouterA-dhcp-pool-0] network 10.1.1.0 mask 255.255.255.0
    
  3. Configure Host A (DHCP client) and Host B. (Details not shown.)

  4. Configure Router B:

    # Enable DHCP snooping, and configure GigabitEthernet 1/0/3 as a DHCP trusted interface.

    <RouterB> system-view
    [RouterB] dhcp snooping enable
    [RouterB] interface gigabitethernet 1/0/3
    [RouterB-GigabitEthernet1/0/3] dhcp snooping trust
    [RouterB-GigabitEthernet1/0/3] quit
    

    # Enable ARP attack detection for user validity check.

    [RouterB] vlan 10
    [RouterB-vlan10] arp detection enable
    

    # Configure GigabitEthernet 1/0/3 as an ARP trusted interface.

    [RouterB-vlan10] interface gigabitethernet 1/0/3
    [RouterB-GigabitEthernet1/0/3] arp detection trust
    [RouterB-GigabitEthernet1/0/3] quit
    

    # Configure a static IP source guard entry on interface GigabitEthernet 1/0/2.

    [RouterB] interface gigabitethernet 1/0/2
    [RouterB-GigabitEthernet1/0/2] ip source binding ip-address 10.1.1.6 mac-address 0001-0203-0607 vlan 10
    [RouterB-GigabitEthernet1/0/2] quit
    

    # Enable ARP packet validity check by checking the MAC addresses and IP addresses of ARP packets.

    [RouterB] arp detection validate dst-mac ip src-mac
    

    # Configure port isolation.

    [RouterB] port-isolate group 1
    [RouterB] interface gigabitethernet 1/0/1
    [RouterB-GigabitEthernet1/0/1] port-isolate enable group 1
    [RouterB-GigabitEthernet1/0/1] quit
    [RouterB] interface gigabitethernet 1/0/2
    [RouterB-GigabitEthernet1/0/2] port-isolate enable group 1
    [RouterB-GigabitEthernet1/0/2] quit
    

    After the configurations are completed, Router B first checks the validity of ARP packets received on GigabitEthernet 1/0/1 and GigabitEthernet 1/0/2. If the ARP packets are confirmed valid, the router performs user validity check by using the static IP source guard bindings and finally DHCP snooping entries. However, ARP broadcast requests sent from Host A can pass the check on Router B and reach Host B. Port isolation fails.

    # Enable ARP restricted forwarding.

    [RouterB] vlan 10
    [RouterB-vlan10] arp restricted-forwarding enable
    [RouterB-vlan10] quit
    

    After the configuration is completed, Router B forwards ARP broadcast requests from Host A to Router A through the trusted interface GigabitEthernet 1/0/3. Host B cannot receive such packets. Port isolation operates correctly.