- 论坛徽章:
- 0
|
我的网络结构是,外网光纤入户,接入三星防火墙,从防火墙出来接入cisco2600路由器,路由器下接cisco3550交换机,3550下接了几台傻瓜交换机和20几台终端pc,傻瓜交换机下接用户终端pc。整个网络划分为5个vlan,共有200台pc吧。我现在遇到的问题是,想要将ip地址和mac做一下绑定,以免非法用户对网络的访问。我在交换机上做过如下的试验,在config(#)模式下进行绑定,arp 192.168.3.3 0019.f290.4540 arpa ,然后我将原192.168.3.3的pc的ip 地址改成192.168.3.4 ,发现该机仍然可以访问网络。
关于ip与mac绑定,我在网上看了好多资料,有的说要用ACL,有的说用ARP IP mac arpa,但是因为对交换和路由不是很懂,所以一直没有试验,恳请各位高手帮我指点一下应该如何配置才能真正做到禁止非法IP访问网络呢?
我将路由的配置和交换机的配置粘贴如下。
router
Current configuration : 1165 bytes
!
version 12.3
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname SY
!
boot-start-marker
boot-end-marker
!
enable secret 5 $1$qUVc$3zw64ERTXBMEWS$#@.Povh/
enable password ********(说明:为了安全,本人将部分内容用*号代替,下同)
!
no network-clock-participate slot 1
no network-clock-participate wic 0
no aaa new-model
ip subnet-zero
ip cef
!
!
!
no ftp-server write-enable
!
!
!
!
interface FastEthernet0/0
ip address 219.*.*.17 255.255.255.123
ip nat outside
duplex auto
speed auto
!
interface FastEthernet0/1
ip address 192.168.1.253 255.255.255.0
ip nat inside
duplex auto
speed auto
!
ip nat inside source list 1 interface FastEthernet0/0 overload
ip nat inside source static 192.168.4.2 219.*.*.18
ip nat inside source static 192.168.4.3 219.*.*.19
ip nat inside source static 192.168.4.4 219.*.*.20
ip classless
ip route 0.0.0.0 0.0.0.0 219.*.*.90
ip route 192.168.0.0 255.255.0.0 192.168.1.1
ip http server
!
access-list 1 permit 192.168.0.0 0.0.255.255
arp 192.168.3.3 0015.f209.5450 ARPA(此条为本人试验时所加,验证后不好用)
!
line con 0
line aux 0
line vty 0 4
password ********
login
line vty 5 181
password ********
login
!
!
!
end
------------------------------------------------------------------------------
switch
Current configuration : 4685 bytes
!
version 12.1
no service pad
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
!
hostname SYswitch
!
enable secret 5 $1$GBLV$P49ewrfdsfdsiwfds@#23.TzX/]$1$GBLV$P49ewrfdsfdsiwfds#23.TzX/
enable password ********
!
ip subnet-zero
ip routing
!
!
spanning-tree mode pvst
spanning-tree extend system-id
!
!
!
!
interface FastEthernet0/1
switchport mode access
!
interface FastEthernet0/2
switchport mode access
!
interface FastEthernet0/3
switchport access vlan 4
switchport mode access
!
interface FastEthernet0/4
switchport access vlan 4
switchport mode access
!
interface FastEthernet0/5
switchport access vlan 4
switchport mode access
!
interface FastEthernet0/6
switchport access vlan 4
switchport mode access
!
interface FastEthernet0/7
switchport access vlan 4
switchport mode access
!
interface FastEthernet0/8
switchport access vlan 4
switchport mode access
!
interface FastEthernet0/9
switchport access vlan 2
switchport mode access
!
interface FastEthernet0/10
switchport access vlan 2
switchport mode access
!
interface FastEthernet0/11
switchport access vlan 3
switchport mode access
!
interface FastEthernet0/12
switchport access vlan 3
switchport mode access
!
interface FastEthernet0/13
switchport access vlan 3
switchport mode access
!
interface FastEthernet0/14
switchport access vlan 5
switchport mode access
!
interface FastEthernet0/15
switchport access vlan 3
switchport mode access
!
interface FastEthernet0/16
switchport access vlan 3
switchport mode access
!
interface FastEthernet0/17
switchport access vlan 5
switchport mode access
!
interface FastEthernet0/18
switchport access vlan 3
switchport mode access
!
interface FastEthernet0/19
switchport access vlan 3
switchport mode access
!
interface FastEthernet0/20
switchport access vlan 3
switchport mode access
!
interface FastEthernet0/21
switchport access vlan 3
switchport mode access
!
interface FastEthernet0/22
switchport access vlan 3
switchport mode access
!
interface FastEthernet0/23
switchport access vlan 3
switchport mode access
!
interface FastEthernet0/24
switchport access vlan 3
switchport mode access
!
interface FastEthernet0/25
switchport access vlan 3
switchport mode access
!
interface FastEthernet0/26
switchport access vlan 3
switchport mode access
!
interface FastEthernet0/27
switchport access vlan 3
switchport mode access
!
interface FastEthernet0/28
switchport access vlan 3
switchport mode access
!
interface FastEthernet0/29
switchport access vlan 3
switchport mode access
!
interface FastEthernet0/30
switchport access vlan 3
switchport mode access
!
interface FastEthernet0/31
switchport access vlan 3
switchport mode access
!
interface FastEthernet0/32
switchport access vlan 3
switchport mode access
!
interface FastEthernet0/33
switchport access vlan 3
switchport mode access
!
interface FastEthernet0/34
switchport access vlan 3
switchport mode access
!
interface FastEthernet0/35
switchport access vlan 3
switchport mode access
!
interface FastEthernet0/36
switchport access vlan 3
switchport mode access
!
interface FastEthernet0/37
switchport access vlan 3
switchport mode access
!
interface FastEthernet0/38
switchport access vlan 3
switchport mode access
!
interface FastEthernet0/39
switchport access vlan 3
switchport mode access
!
interface FastEthernet0/40
switchport access vlan 3
switchport mode access
!
interface FastEthernet0/41
switchport access vlan 3
switchport mode access
!
interface FastEthernet0/42
switchport access vlan 3
switchport mode access
!
interface FastEthernet0/43
switchport access vlan 3
switchport mode access
!
interface FastEthernet0/44
switchport access vlan 3
switchport mode access
!
interface FastEthernet0/45
switchport access vlan 3
switchport mode access
!
interface FastEthernet0/46
switchport access vlan 3
switchport mode access
!
interface FastEthernet0/47
switchport access vlan 3
switchport mode access
!
interface FastEthernet0/48
switchport access vlan 3
switchport mode access
!
interface GigabitEthernet0/1
switchport mode dynamic desirable
!
interface GigabitEthernet0/2
switchport mode dynamic desirable
!
interface Vlan1
ip address 192.168.1.1 255.255.255.0
!
interface Vlan2
ip address 192.168.2.1 255.255.255.0
!
interface Vlan3
ip address 192.168.3.1 255.255.255.0
!
interface Vlan4
ip address 192.168.4.1 255.255.255.0
!
interface Vlan5
ip address 192.168.5.1 255.255.255.0
!
ip classless
ip route 0.0.0.0 0.0.0.0 192.168.1.253
ip http server
!
arp 192.168.3.3 0015.f209.5450 ARPA alias(本条为本人测试用后加)
!
line con 0
line vty 0 4
password *********
login
line vty 5 15
password ********
login
!
!
end |
|