Ipv4 Source Guard - Edge-Core ECS4620-28T Quick Start Manual

28/52-port l3 stackable gigabit ethernet switch
Hide thumbs Also See for ECS4620-28T:
Table of Contents

Advertisement

Chapter 12
| Security Measures

IPv4 Source Guard

IPv4 Source Guard
Configuring Ports
for IPv4 Source Guard
IPv4 Source Guard is a security feature that filters IP traffic on network interfaces
based on manually configured entries in the IP Source Guard table, or dynamic
entries in the DHCP Snooping table when enabled (see
page
380). IP source guard can be used to prevent traffic attacks caused when a
host tries to use the IPv4 address of a neighbor to access the network. This section
describes how to configure IPv4 Source Guard.
Use the Security > IP Source Guard > Port Configuration page to set the filtering
type based on source IP address, or source IP address and MAC address pairs. It also
specifies lookup within the ACL binding table or the MAC address binding table, as
well as the maximum number of allowed binding entries for the lookup tables.
IP Source Guard is used to filter traffic on an insecure port which receives messages
from outside the network or fire wall, and therefore may be subject to traffic attacks
caused by a host trying to use the IP address of a neighbor.
Command Usage
Filter Type
Setting source guard mode to SIP (Source IP) or SIP-MAC (Source IP and MAC)
enables this function on the selected port. Use the SIP option to check the
VLAN ID, source IP address, and port number against all entries in the binding
table. Use the SIP-MAC option to check these same parameters, plus the source
MAC address. If no matching entry is found, the packet is dropped.
Note:
Multicast addresses cannot be used by IP Source Guard.
When enabled, traffic is filtered based upon dynamic entries learned via DHCP
snooping (see
"DHCP Snooping" on page
the source guard binding table.
If IP source guard is enabled, an inbound packet's IP address (SIP option) or
both its IP address and corresponding MAC address (SIP-MAC option) will be
checked against the binding table. If no matching entry is found, the packet
will be dropped.
Filtering rules are implemented as follows:
If DHCP snooping is disabled (see
VLAN ID, source IP address, port number, and source MAC address (for the
SIP-MAC option). If a matching entry is found in the binding table and the
entry type is static IP source guard binding, the packet will be forwarded.
If DHCP snooping is enabled, IP source guard will check the VLAN ID, source
IP address, port number, and source MAC address (for the SIP-MAC option).
380), or static addresses configured in
page
– 368 –
"DHCP Snooping" on
382), IP source guard will check the

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents