<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Antispoofing Parameters and Associated SNMP Notification Message in ExtremeSwitching (Other)</title>
    <link>https://community.extremenetworks.com/t5/extremeswitching-other/antispoofing-parameters-and-associated-snmp-notification-message/m-p/10729#M1757</link>
    <description>For the purpose of this thread I have assumed that antispoofing to be configured with a value that's default on the C series, DHCP snooping feature of 15pps.&lt;BR /&gt;
&lt;BR /&gt;
In order to do this the configuration has been configured as follows (450 / 30 = 15):&lt;BR /&gt;
&lt;BR /&gt;
set antispoof class 1 timeout 30&lt;BR /&gt;
set antispoof class 1 threshold-index 1 threshold-value 450 action syslog trap&lt;BR /&gt;
set antispoof port-class 1 &lt;BR /&gt;
set antispoof duplicateIP&lt;BR /&gt;
set antispoof dhcp-snooping mac-verification enable &lt;BR /&gt;
set antispoof arp-inspection enable &lt;BR /&gt;
set antispoof ip-inspection enable &lt;BR /&gt;
set antispoof enable&lt;BR /&gt;
&lt;BR /&gt;
In order for any of the antispoofing protocols to populate the antispoofing binding table there must be an entry for the mac address in the multi-auth session table. In order to do this you need to add the following config:&lt;BR /&gt;
&lt;BR /&gt;
set auto-tracking enable&lt;BR /&gt;
set auto-tracking port enable &lt;BR /&gt;
&lt;BR /&gt;
In this particular scenario 802.1x is also enabled but for forced-auth, and multi-auth has to be set to 'auth-opt' and 'mode multi' otherwise the multi-auth session table will not populate and therefore neither will the antispoof binding table.&lt;BR /&gt;
&lt;BR /&gt;
set dot1x auth-config authcontrolled-portcontrol forced-auth ge.*.*&lt;BR /&gt;
&lt;BR /&gt;
set multi-auth mode multi&lt;BR /&gt;
set multi-auth port auth-opt &lt;BR /&gt;
&lt;BR /&gt;
set dot1x enable&lt;BR /&gt;
&lt;BR /&gt;
Currently entries are populating in the multiauth session table via auto-tracking and the Anti-spoofing binding table is currently being populated via IP Source Guard and Dynamic ARP Inspection. This is because static IP addresses are currently being used with the&lt;BR /&gt;
introduction of Dhcp and Dhcp snooping at a later date.&lt;BR /&gt;
&lt;BR /&gt;
The issue experienced is that the following trap message is coming so frequent (multiple times a second for each port), that the trap log continually gets filled with the message:&lt;BR /&gt;
&lt;BR /&gt;
etsysAntiSpoofThresholdValue = 0&lt;BR /&gt;
etsysAntiSpoofStationBindingEntryMacAddr = xx.xx.xx.xx.xx&lt;BR /&gt;
etsysAntiSpoofStationBindingEntryInetAddrType = INTEGER: ip4 (i)&lt;BR /&gt;
etsysAntiSpoofStationBindingEntryInetAddr = xxx.xxx.xxx.xxx&lt;BR /&gt;
etsysAntiSpoofStationBindingEntryIfIndex = INTEGER: 72020&lt;BR /&gt;
etsysAntiSpoofStationBindingEntryBindingType = INTEGER: ip(3)&lt;BR /&gt;
etsysAntiSpoofStationBindingEntryInetCounter = Wrong Typr (Should be Counter32): INTEGER: 0&lt;BR /&gt;
&lt;BR /&gt;
The notification interval is left as default of 60 seconds&lt;BR /&gt;
&lt;BR /&gt;
In order to control the amount of messages I changed the timeout value from 30 to 1500 and threshold from 450 to 150, in order to give the same value of 15 (1500 / 150 = 15). Since then the messages have calmed down a lot, but still come in every now and then? &lt;BR /&gt;
So I my questions are:&lt;BR /&gt;
&lt;BR /&gt;
1) What exactly is the trap message telling me, as I can't decide whether to be concerned or not?&lt;BR /&gt;
2) What figures should I use for either best practice or ratio to give the target value of 15pps.&lt;BR /&gt;
&lt;BR /&gt;
This on K/S Series, Firmware 08.02.01.0012&lt;BR /&gt;
&lt;BR /&gt;</description>
    <pubDate>Fri, 17 Oct 2014 14:20:00 GMT</pubDate>
    <dc:creator>Anonymous</dc:creator>
    <dc:date>2014-10-17T14:20:00Z</dc:date>
    <item>
      <title>Antispoofing Parameters and Associated SNMP Notification Message</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-other/antispoofing-parameters-and-associated-snmp-notification-message/m-p/10729#M1757</link>
      <description>For the purpose of this thread I have assumed that antispoofing to be configured with a value that's default on the C series, DHCP snooping feature of 15pps.&lt;BR /&gt;
&lt;BR /&gt;
In order to do this the configuration has been configured as follows (450 / 30 = 15):&lt;BR /&gt;
&lt;BR /&gt;
set antispoof class 1 timeout 30&lt;BR /&gt;
set antispoof class 1 threshold-index 1 threshold-value 450 action syslog trap&lt;BR /&gt;
set antispoof port-class 1 &lt;BR /&gt;
set antispoof duplicateIP&lt;BR /&gt;
set antispoof dhcp-snooping mac-verification enable &lt;BR /&gt;
set antispoof arp-inspection enable &lt;BR /&gt;
set antispoof ip-inspection enable &lt;BR /&gt;
set antispoof enable&lt;BR /&gt;
&lt;BR /&gt;
In order for any of the antispoofing protocols to populate the antispoofing binding table there must be an entry for the mac address in the multi-auth session table. In order to do this you need to add the following config:&lt;BR /&gt;
&lt;BR /&gt;
set auto-tracking enable&lt;BR /&gt;
set auto-tracking port enable &lt;BR /&gt;
&lt;BR /&gt;
In this particular scenario 802.1x is also enabled but for forced-auth, and multi-auth has to be set to 'auth-opt' and 'mode multi' otherwise the multi-auth session table will not populate and therefore neither will the antispoof binding table.&lt;BR /&gt;
&lt;BR /&gt;
set dot1x auth-config authcontrolled-portcontrol forced-auth ge.*.*&lt;BR /&gt;
&lt;BR /&gt;
set multi-auth mode multi&lt;BR /&gt;
set multi-auth port auth-opt &lt;BR /&gt;
&lt;BR /&gt;
set dot1x enable&lt;BR /&gt;
&lt;BR /&gt;
Currently entries are populating in the multiauth session table via auto-tracking and the Anti-spoofing binding table is currently being populated via IP Source Guard and Dynamic ARP Inspection. This is because static IP addresses are currently being used with the&lt;BR /&gt;
introduction of Dhcp and Dhcp snooping at a later date.&lt;BR /&gt;
&lt;BR /&gt;
The issue experienced is that the following trap message is coming so frequent (multiple times a second for each port), that the trap log continually gets filled with the message:&lt;BR /&gt;
&lt;BR /&gt;
etsysAntiSpoofThresholdValue = 0&lt;BR /&gt;
etsysAntiSpoofStationBindingEntryMacAddr = xx.xx.xx.xx.xx&lt;BR /&gt;
etsysAntiSpoofStationBindingEntryInetAddrType = INTEGER: ip4 (i)&lt;BR /&gt;
etsysAntiSpoofStationBindingEntryInetAddr = xxx.xxx.xxx.xxx&lt;BR /&gt;
etsysAntiSpoofStationBindingEntryIfIndex = INTEGER: 72020&lt;BR /&gt;
etsysAntiSpoofStationBindingEntryBindingType = INTEGER: ip(3)&lt;BR /&gt;
etsysAntiSpoofStationBindingEntryInetCounter = Wrong Typr (Should be Counter32): INTEGER: 0&lt;BR /&gt;
&lt;BR /&gt;
The notification interval is left as default of 60 seconds&lt;BR /&gt;
&lt;BR /&gt;
In order to control the amount of messages I changed the timeout value from 30 to 1500 and threshold from 450 to 150, in order to give the same value of 15 (1500 / 150 = 15). Since then the messages have calmed down a lot, but still come in every now and then? &lt;BR /&gt;
So I my questions are:&lt;BR /&gt;
&lt;BR /&gt;
1) What exactly is the trap message telling me, as I can't decide whether to be concerned or not?&lt;BR /&gt;
2) What figures should I use for either best practice or ratio to give the target value of 15pps.&lt;BR /&gt;
&lt;BR /&gt;
This on K/S Series, Firmware 08.02.01.0012&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Fri, 17 Oct 2014 14:20:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-other/antispoofing-parameters-and-associated-snmp-notification-message/m-p/10729#M1757</guid>
      <dc:creator>Anonymous</dc:creator>
      <dc:date>2014-10-17T14:20:00Z</dc:date>
    </item>
  </channel>
</rss>

