Ip Source Guard For Static Hosts; Configuring Ip Source Guard - Cisco Catalyst 2960 Software Configuration Manual

Hide thumbs Also See for Catalyst 2960:
Table of Contents

Advertisement

Configuring IP Source Guard

IP Source Guard for Static Hosts

Do not use IPSG (IP source guard) for static hosts on uplink ports or trunk ports.
Note
IPSG for static hosts extends the IPSG capability to non-DHCP and static environments. The previous
IPSG used the entries created by DHCP snooping to validate the hosts connected to a switch. Any traffic
received from a host without a valid DHCP binding entry is dropped. This security feature restricts IP
traffic on nonrouted Layer 2 interfaces. It filters traffic based on the DHCP snooping binding database
and on manually configured IP source bindings. The previous version of IPSG required a DHCP
environment for IPSG to work.
IPSG for static hosts allows IPSG to work without DHCP. IPSG for static hosts relies on IP device
tracking-table entries to install port ACLs. The switch creates static entries based on ARP requests or
other IP packets to maintain the list of valid hosts for a given port. You can also specify the number of
hosts allowed to send traffic to a given port. This is equivalent to port security at Layer 3.
IPSG for static hosts also supports dynamic hosts. If a dynamic host receives a DHCP-assigned IP
address that is available in the IP DHCP snooping table, the same entry is learned by the IP device
tracking table. In a stacked environment, when the master failover occurs, the IP source guard entries for
static hosts attached to member ports are retained. When you enter the show ip device tracking all
EXEC command, the IP device tracking table displays the entries as ACTIVE.
Note
IPSG for static hosts initially learns IP or MAC bindings dynamically through an ACL-based snooping
mechanism. IP or MAC bindings are learned from static hosts by ARP and IP packets. They are stored
in the device tracking database. When the number of IP addresses that have been dynamically learned or
statically configured on a given port reaches a maximum, the hardware drops any packet with a new IP
address. To resolve hosts that have moved or gone away for any reason, IPSG for static hosts leverages
IP device tracking to age out dynamically learned IP address bindings. This feature can be used with
DHCP snooping. Multiple bindings are established on a port that is connected to both DHCP and static
hosts. For example, bindings are stored in both the device tracking database as well as in the DHCP
snooping binding database.
Configuring IP Source Guard
Catalyst 2960 and 2960-S Switches Software Configuration Guide, Release 15.0(1)SE
20-14
Some IP hosts with multiple network interfaces can inject some invalid packets into a network
interface. The invalid packets contain the IP or MAC address for another network interface of
the host as the source address. The invalid packets can cause IPSG for static hosts to connect to
the host, to learn the invalid IP or MAC address bindings, and to reject the valid bindings.
Consult the vender of the corresponding operating system and the network interface to prevent
the host from injecting invalid packets.
Default IP Source Guard Configuration, page 20-15
IP Source Guard Configuration Guidelines, page 20-15
Enabling IP Source Guard, page 20-16
Configuring IP Source Guard for Static Hosts, page 20-17
Chapter 20
Configuring DHCP and IP Source Guard Features
OL-26520-01

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Catalyst 2960-s

Table of Contents