Configuring Link Protection
To use link protection, you set the protection property
of the link. If the type of protection works with other configuration files,
such as ip-nospoof with allowed-ips or dhcp-nospoof with allowed-dhcp-cids, then you
perform two general actions. First, you enable link protection. Then, you
customize the configuration file to identify other packets that are allowed to pass.
Note - You must configure link protection in the global zone.
The following task map points to the procedures for configuring link
protection on an Oracle Solaris system.
Table 1 Configuring Link Protection Task Map
| | |
Enable link protection.
| Restricts the packets that are sent from a link and protects links from
spoofing.
|
|
Disable link protection.
| Removes link protections.
|
|
Specify the IP link protection type.
| Specifies the IP addresses that can pass through the link protection
mechanism.
|
|
Specify the DHCP link protection type.
| Specifies the DHCP addresses that can pass through the link protection
mechanism.
|
|
View the link protection configuration.
| Lists the protected links and the exceptions, and shows the enforcement
statistics.
|
|
|