Juniper JUNOS OS 10.4 - FOR EX REV 1 Manual page 3217

For ex series ethernet switches
Table of Contents

Advertisement

Requirements
Overview and Topology
Copyright © 2010, Juniper Networks, Inc.
This example describes how to configure IP source guard with 802.1X user authentication
on a data VLAN, with a voice VLAN on the same interface:
Requirements on page 3113
Overview and Topology on page 3113
Configuration on page 3114
Verification on page 3116
This example uses the following hardware and software components:
One EX Series switch
Junos OS Release 9.2 or later for EX Series switches
A DHCP server to provide IP addresses to network devices on the switch
A RADIUS server to provide 802.1X authentication
Before you configure IP source guard for the data VLANs, be sure you have:
Connected the DHCP server to the switch.
Connected the RADIUS server to the switch and configured user authentication on the
server. See "Example: Connecting a RADIUS Server for 802.1X to an EX Series Switch"
on page 2765.
Configured the VLANs. See "Example: Setting Up Bridging with Multiple VLANs for EX
Series Switches" on page 1532 for detailed information about configuring VLANs.
IP source guard checks the IP source address and MAC source address in a packet sent
from a host attached to an untrusted access interface on the switch. If IP source guard
determines that the packet header contains an invalid source IP address or source MAC
address, it ensures that the switch does not forward the packet—that is, the packet is
discarded.
When you configure IP source guard, you enable on it on one or more VLANs. IP source
guard applies its checking rules to untrusted access interfaces on those VLANs. By default,
on EX Series switches, access interfaces are untrusted and trunk interfaces are trusted.
IP source guard does not check packets that have been sent to the switch by devices
connected to either trunk interfaces or trusted access interfaces—that is, interfaces
configured with
dhcp-trusted
to provide dynamic IP addresses.
IP source guard obtains information about IP-address/MAC-address/VLAN bindings
from the DHCP snooping database. It causes the switch to validate incoming IP packets
against the entries in that database.
Chapter 100: Examples: Port Security Configuration
so that a DHCP server can be connected to that interface
3113

Advertisement

Table of Contents
loading

This manual is also suitable for:

Junos os 10.4

Table of Contents