Dell PowerConnect J-EX4200-24T Software Manual page 2681

J series; j-ex series
Table of Contents

Advertisement

Requirements
Overview and Topology
This example describes how to configure IP source guard with 802.1X user authentication
on a data VLAN, with a voice VLAN on the same interface:
Requirements on page 2609
Overview and Topology on page 2609
Configuration on page 2610
Verification on page 2612
This example uses the following hardware and software components:
One J-EX Series switch
A DHCP server to provide IP addresses to network devices on the switch
A RADIUS server to provide 802.1X authentication
Before you configure IP source guard for the data VLANs, be sure you have:
Connected the DHCP server to the switch.
Connected the RADIUS server to the switch and configured user authentication on the
server. See "Example: Connecting a RADIUS Server for 802.1X to a J-EX Series Switch"
on page 2267.
Configured the VLANs. See "Example: Setting Up Bridging with Multiple VLANs for J-EX
Series Switches" on page 1070 for detailed information about configuring VLANs.
IP source guard checks the IP source address and MAC source address in a packet sent
from a host attached to an untrusted access interface on the switch. If IP source guard
determines that the packet header contains an invalid source IP address or source MAC
address, it ensures that the switch does not forward the packet—that is, the packet is
discarded.
When you configure IP source guard, you enable on it on one or more VLANs. IP source
guard applies its checking rules to untrusted access interfaces on those VLANs. By default,
on J-EX Series switches, access interfaces are untrusted and trunk interfaces are trusted.
IP source guard does not check packets that have been sent to the switch by devices
connected to either trunk interfaces or trusted access interfaces—that is, interfaces
configured with
dhcp-trusted
to provide dynamic IP addresses.
IP source guard obtains information about IP-address/MAC-address/VLAN bindings
from the DHCP snooping database. It causes the switch to validate incoming IP packets
against the entries in that database.
The topology for this example includes one J-EX4200-24T switch, a PC and an IP phone
connected on the same interface, a connection to a DHCP server, and a connection to a
RADIUS server for user authentication.
Chapter 94: Examples: Port Security Configuration
so that a DHCP server can be connected to that interface
2609

Advertisement

Table of Contents
loading

Table of Contents