Source Ip Address Filtering; Source Ip And Mac Address Filtering; Ip Source Guard For Static Hosts - Cisco WS-CBS3032-DEL Software Configuration Manual

Software guide
Table of Contents

Advertisement

Chapter 22
Configuring DHCP Features and IP Source Guard
IPSG is supported only on Layer 2 ports, including access and trunk ports.You can configure IPSG with
source IP address filtering or with source IP and MAC address filtering.

Source IP Address Filtering

When IPSG is enabled with this option, IP traffic is filtered based on the source IP address. The switch
forwards IP traffic when the source IP address matches an entry in the DHCP snooping binding database
or a binding in the IP source binding table.
When a DHCP snooping binding or static IP source binding is added, changed, or deleted on an interface,
the switch modifies the port ACL by using the IP source binding changes and re-applies the port ACL to
the interface.
If you enable IPSG on an interface on which IP source bindings (dynamically learned by DHCP snooping
or manually configured) are not configured, the switch creates and applies a port ACL that denies all IP
traffic on the interface. If you disable IP source guard, the switch removes the port ACL from the
interface.

Source IP and MAC Address Filtering

IP traffic is filtered based on the source IP and MAC addresses. The switch forwards traffic only when
the source IP and MAC addresses match an entry in the IP source binding table.
When address filtering is enabled, the switch filters IP and non-IP traffic. If the source MAC address of
an IP or non-IP packet matches a valid IP source binding, the switch forwards the packet. The switch
drops all other types of packets except DHCP packets.
The switch uses port security to filter source MAC addresses. The interface can shut down when a
port-security violation occurs.

IP Source Guard for Static Hosts

Do not use IPSG for static hosts on uplink ports or trunk ports.
Note
IPSG for static hosts extends the IPSG capability to non-DHCP and static environments. The previous
IPSG used the entries created by DHCP snooping to validate the hosts connected to a switch. Any traffic
received from a host without a valid DHCP binding entry is dropped. This security feature restricts IP
traffic on nonrouted Layer 2 interfaces. It filters traffic based on the DHCP snooping binding database
and on manually configured IP source bindings. The previous version of IPSG required a DHCP
environment for IPSG to work.
IPSG for static hosts allows IPSG to work without DHCP. IPSG for static hosts relies on IP device
tracking-table entries to install port ACLs. The switch creates static entries based on ARP requests or
other IP packets to maintain the list of valid hosts for a given port. You can also specify the number of
hosts allowed to send traffic to a given port. This is equivalent to port security at Layer 3.
OL-13270-06
Source IP Address Filtering, page 22-17
Source IP and MAC Address Filtering, page 22-17
IP Source Guard for Static Hosts, page 22-17
Cisco Catalyst Blade Switch 3130 and 3032 for Dell Software Configuration Guide
Understanding IP Source Guard
22-17

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Catalyst blade 3130Catalyst blade 3032

Table of Contents