Ip Source Guard; Interactions With Other Features - Cisco SF500-24 Administration Manual

Esw2 series advanced switches
Hide thumbs Also See for SF500-24:
Table of Contents

Advertisement

Security

IP Source Guard

STEP 4
IP Source Guard
Cisco 500 Series Stackable Managed Switch Administration Guide Release 1.3
Interface—Select the interface on which the IP fragmentation is being
defined.
IP Address—Enter an IP network from which the fragmented IP packets is
filtered or select All Addresses to block IP fragmented packets from all
addresses. If you enter the IP address, enter either the mask or prefix length.
Network Mask—Select the format for the subnet mask for the source IP
address, and enter a value in one of the field:
-
Mask—Select the subnet to which the source IP address belongs and
enter the subnet mask in dotted decimal format.
-
Prefix Length—Select the Prefix Length and enter the number of bits that
comprise the source IP address prefix.
Click Apply. The IP fragmentation is defined, and the Running Configuration file is
updated.
IP Source Guard is a security feature that can be used to prevent traffic attacks
caused when a host tries to use the IP address of its neighbor.
When IP Source Guard is enabled, the device only transmits client IP traffic to IP
addresses contained in the DHCP Snooping Binding database. This includes both
addresses added by DHCP Snooping and manually-added entries.
If the packet matches an entry in the database, the device forwards it. If not, it is
dropped.

Interactions with Other Features

The following points are relevant to IP Source Guard:
DHCP Snooping must be globally enabled in order to enable IP Source
Guard on an interface.
IP source guard can be active on an interface only if:
-
DHCP Snooping is enabled on at least one of the port's VLANs
20
414

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents