# 查看ARP表,确认具体的攻击MAC地址
display arp | include 192.168.30
# 查看MAC地址表,找到该MAC对应的端口
display mac-address | include <攻击MAC>
# 例如:display mac-address | include 0011-2233-4455
# 如果看到多个端口出现同一个MAC,说明有环路或欺骗# 立即关闭攻击端口
interface GigabitEthernet x/x/x
shutdown
description "DHCP-Attack-Isolated-$(date)"
# 或使用端口安全功能隔离
port-security enable
port-security max-mac-num 1
port-security protect-action shutdown# 清除当前冲突记录
reset dhcp server conflict all
# 查看清理后状态
display dhcp server conflict# 进入系统视图
system-view
# 全局启用DHCP Snooping
dhcp snooping enable
# 在VLAN上启用(假设是VLAN 1)
vlan 1
dhcp snooping enable
quit
# 配置信任端口(连接合法DHCP服务器的端口)
interface GigabitEthernet x/x/x # DHCP服务器所在端口
dhcp snooping trust
quit
# 在用户接入端口限制DHCP请求速率
interface range GigabitEthernet 1/0/1 to GigabitEthernet 1/0/24
dhcp snooping max-learning-num 3 # 每个端口最多学习3个DHCP绑定
dhcp snooping check dhcp-rate enable
dhcp snooping check dhcp-rate 10 # 每秒最多10个DHCP请求
quit# 启用IP源防护
dhcp snooping binding record
user-bind enable
# 在接入端口启用IP源检查
interface range GigabitEthernet 1/0/1 to GigabitEthernet 1/0/24
ip source check user-bind enable
quit# 在VLAN上启用ARP检测
vlan 1
arp detection enable
quit
# 配置信任端口(DHCP服务器和核心设备端口)
interface GigabitEthernet x/x/x
arp detection trust
quit# 查看当前DHCP配置
display dhcp server ip-in-use
display dhcp server free-ip
# 配置DHCP地址池保护
dhcp server ip-pool vlan1
gateway-list 192.168.30.1
network 192.168.30.0 mask 255.255.255.0
# 限制每个MAC的最大租约数
option 82
dhcp-server max-lease-per-mac 2
# 缩短租约时间(临时措施)
lease day 0 hour 1 minute 0
# 启用冲突检测
conflict auto-recycle interval 30
# 配置地址池保留(避免全部分配)
reserved-ip-address 192.168.30.201 192.168.30.254
quit# 全局启用环路检测
loopback-detection enable
# 在所有接入端口启用
interface range GigabitEthernet 1/0/1 to GigabitEthernet 1/0/48
loopback-detection enable
loopback-detection action shutdown # 检测到环路时关闭端口
loopback-detection recovery-time 600 # 10分钟后自动恢复
quit# 全局启用STP
stp global enable
stp mode rstp
# 配置边缘端口(所有接入端口)
interface range GigabitEthernet 1/0/1 to GigabitEthernet 1/0/48
stp edged-port enable
stp bpdu-protection # BPDU保护
quit
# 设置根桥优先级
stp priority 4096# 查看DHCP Snooping状态
display dhcp snooping
# 查看绑定表
display dhcp snooping binding
# 查看违规统计
display dhcp snooping statistics
# 实时监控DHCP日志
terminal monitor
terminal logging
debugging dhcp server event
debugging dhcp snooping packet# 创建镜像会话
mirroring-group 1 local
mirroring-group 1 mirroring-port GigabitEthernet 1/0/1 inbound
mirroring-group 1 monitor-port GigabitEthernet 1/0/48
# 或使用packet-capture(如果交换机支持)
packet-capture interface GigabitEthernet 1/0/1 inbound# 检查CPU和内存使用率
display cpu-usage
display memory-usage
# 查看端口流量统计
display interface GigabitEthernet 1/0/1
display counters inbound interface GigabitEthernet 1/0/109:13:30- 第一波开始# 查看日志缓冲
display logbuffer | include DHCP
display logbuffer | include 09:13
# 查看安全日志
display security-log# 创建ACL阻断异常DHCP流量
acl number 3000
rule 5 deny udp destination-port eq 67 # 阻止非法DHCP响应
rule 10 deny udp destination-port eq 68 time-range morning-attack
quit
# 创建时间范围
time-range morning-attack 09:00 to 10:00 working-day
# 应用ACL到接入端口
interface range GigabitEthernet 1/0/1 to GigabitEthernet 1/0/48
packet-filter 3000 inbound
quit# 创建隔离VLAN
vlan 100
name DHCP-Isolation
quit
# 将疑似问题端口移到隔离VLAN
interface GigabitEthernet x/x/x
port access vlan 100
quit# 启用802.1X认证
dot1x
dot1x authentication-method eap
# 配置Radius服务器
radius scheme dhcp-protect
primary authentication 192.168.1.100
key authentication cipher xxxx
quit# 导出配置备份
display current-configuration > backup-config-$(date +%Y%m%d).txt
# 检查安全配置
display security-policy
display acl alldisplay current-configurationdisplay diagnostic-information# 在攻击发生前开始抓包
packet-capture interface GigabitEthernet 1/0/1 inbound size 2048display versiondisplay logbufferDHCP Snooping + IPSG + DAI三合一防护,基本可以防御此类攻击。如果仍有问题,可能需要检查网络中是否有无线网络、VPN设备或访客网络作为攻击入口。
亲~登录后才可以操作哦!
确定你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作
举报
×
侵犯我的权益
×
侵犯了我企业的权益
×
抄袭了我的内容
×
原文链接或出处
诽谤我
×
对根叔社区有害的内容
×
不规范转载
×
举报说明
暂无评论