Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To create a static IPv6 IMPB entry that binds the IPv6 address fe80::240:5ff:fe00:28 to the MAC
address 00-00-00-00-00-11:
fe80::240:5ff:fe00:28 mac_address 00-00-00-00-00-11
Command: create address_binding ip_mac ipv6address fe80::240:5ff:fe00:28
mac_address 00-00-00-00-00-11
Success.
50-3 config address_binding ip_mac ports
Description
This command is used to configure the per port state of IP-MAC-Port binding in the switch. If a port
has been configured as group member of an aggregated link, then it can not enable its IP-MAC-
Port binding function. When the binding check state is enabled, for IP packet and ARP packet
received by this port, the switch will check whether the the IP address and MAC address match the
binding entries. The packets will be dropped if they do not match. For this function, the switch can
operate in ARP Inspection and IP Inspection.
ARP Inspection: All ARP packets will be checked while ARP Inspection is enabled. The legal
ARP packets will be forwarded, while the illegal ARP packets will be dropped.
IP Inspection: All IP packets will be checked while IP Inspection is enabled. The legal IP packets
will be forwarded, while the illegal IP packets will be dropped. When IP Inspection is enabled, and
ARP Inspection is disabled, all non-IP packets (L2 packets, ARP…) will be forwarded by default.
Format
config address_binding ip_mac ports [<portlist> | all] {arp_inspection [strict | loose |
disable] | ip_inspection [enable | disable] | nd_inspection [enable | disable] | protocol [ipv4 |
ipv6 | all] | allow_zeroip [enable | disable] | forward_dhcppkt [enable | disable] |
stop_learning_threshold <int 0-500>}(1)
Parameters
ARP packets wil be forwarded, while the illegal packets will be dropped.
strict - Specifies that in this mode, all packets are dropped by default until a legal ARP or IP