Switchport Protected Command

By daxm (February 8th, 2010)

Similar to Private VLAN’s concept of an isolated VLAN is a command called Switchport Protected.  It is similar in that any interface that is in the same VLAN and is in “switchport protected” mode cannot see each other but can see other ports NOT in switchport protected mode that are in the same VLAN.  This feature ONLY works on a per switch basis.  So protected interfaces on different switches can communicate with each other as if the protected command wasn’t there.

Here is my graphic to display this:

Leggi tutto

Private VLANs

By daxm (February 1st, 2010)

To help myself better understand private VLANs I created the following picture:

Private VLAN Diagram

Leggi tutto

Dynamic ARP Inspection (DAI)

By daxm (January 31st, 2010)

As mentioned in my previous post, here are my notes on DAI.

To enable DAI all is needed is 1 command:  (config)#ip arp inspection vlan <num> HOWEVER there is so much behind this simple command it is scary.

Unless additional parameters are configured DAI uses the DHCP snooping bindings table to know what IP-to-MAC-to-Interface mappings are permitted.  Here is a copy of my DHCP snooping table on my home switch:

daxm-home-switch#show ip dhcp snooping binding
MacAddress          IpAddress        Lease(sec)  Type           VLAN  Interface
——————  —————  ———-  ————-  —-  ——————–
00:1E:90:EC:61:7A   192.168.1.39     2747        dhcp-snooping   1     FastEthernet1/0/1
00:22:68:15:74:1E   192.168.1.18     3528        dhcp-snooping   1     FastEthernet1/0/4
00:50:56:00:00:01   192.168.1.34     3003        dhcp-snooping   1     FastEthernet1/0/1
Total number of bindings: 3

daxm-home-switch#

Leggi tutto

DHCP Snooping

By daxm (January 31st, 2010)

DHCP snooping seems to me to be a strange security enhancement. Though I do agree that securing against a rogue DHCP server is important the way Cisco implements it is odd.

In order for DHCP snooping to work at least 3 configurations are  needed:

1) Enable DHCP snooping on the switch — (config)#ip dhcp snooping

2) All ports are “untrusted” by default.  Specify which port are “trusted”.  A trusted interfaces consist of interfaces along the path to the DHCP server.  So, trunk ports and the actual port connecting to the DHCP server need to be configured as trusted ports.  — (config-if)#ip dhcp snooping trust

3) Identify which VLANs DHCP snooping will monitor. — (config)#ip dhcp snooping vlan <num>

4) (Optional?)  After configuring the above commands in my local (home) network I noticed that my DHCP requests were not being answered.  Thanks to a buddy of mine (Thanks Walt!) he showed me that the DHCP snooping process was adding Option 82 to my DHCP requests by default.  Apparently my DHCP server didn’t like that option because as soon as I disabled Option 82 from being sent my DHCP requests were being answered. — (config)#no ip dhcp snooping information option

Leggi tutto