cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1454
Views
0
Helpful
7
Replies

Manually add mac to DHCP snooping database?

Andy White
Level 3
Level 3

Hello,

I have enabeld DHCP snooping on a VLAN and left it a few days an enabled Dynamic ARP Inspection and all is good apart from one user who has a static IP so he doesn't appear in the DHCP snooping bindings list, but his port goes into err-disabled.  I guess I can trust the port, but can you add static entries, I guess soemone coudl spoof their mac and assign the correct static IP?

Thanks

1 Accepted Solution

Accepted Solutions

Hello Andy - yes it would. Pauls example is correct.

Please see this: http://ccietobe.blogspot.co.uk/2009/01/dynamic-arp-inspection-with-non-dhcp.html

But just to add I would do this instead:

ip arp inspection filter TST vlan x 

Hope this helps.

Please rate useful posts and remember to mark any solved questions as answered. Thank you.

Please rate useful posts & remember to mark any solved questions as answered. Thank you.

View solution in original post

7 Replies 7

Hello Andy

The DAI filter list is inspected before the snoop d/b so in case, so to answer your question, yes you can add a static mac address.

arp access-list TST
permit ip host x.x.x.x  mac host 0000.1111.2222

ip arp inspection filter-list TST

res

Paul

Please don't forget to rate any posts that have been helpful.

Thanks.


Please rate and mark as an accepted solution if you have found any of the information provided useful.
This then could assist others on these forums to find a valuable answer and broadens the community’s global network.

Kind Regards
Paul

Thanks Paul, so will this work along side the "

ip arp inspection vlan x" that is running?

Hello Andy - yes it would. Pauls example is correct.

Please see this: http://ccietobe.blogspot.co.uk/2009/01/dynamic-arp-inspection-with-non-dhcp.html

But just to add I would do this instead:

ip arp inspection filter TST vlan x 

Hope this helps.

Please rate useful posts and remember to mark any solved questions as answered. Thank you.

Please rate useful posts & remember to mark any solved questions as answered. Thank you.

That worked great, the url was perfect and yes you need to use:

ip arp inspection filter TST vlan x

and not

ip arp inspection filter-list TST

One other thing, in the "show mac address-table" there are dynamic and static.  Dynamic are learned by arp and static are manually entered.  I see my port-security enabled ports are static, so I guess these are just being seen as my manually everything the mac address?

interface FastEthernet0/13

switchport mode access

switchport port-security

switchport port-security aging time 1

switchport port-security aging type inactivity

ip arp inspection trust

spanning-tree portfast

spanning-tree bpduguard enable

Yes, when you have port security this way, im sure i remember studying that the mac addresses are then written to the configuration of the switch. Therefor it is static.

You could try a show run and see if this is true, its been a while and I can't remember.

Hope this helps.

Please rate useful posts and remember to mark any solved questions as answered. Thank you.

Please rate useful posts & remember to mark any solved questions as answered. Thank you.

They don't appear in the running config, but I know they will if they are sticky ports and are saved to the startup config if I wr mem.