Chapter 11 Network Security; Ip-Mac Binding; Binding Table - TP-Link TL-SG3210 User Manual

Jetstream l2 managed switch
Table of Contents

Advertisement

Chapter 11 Network Security

Network Security module is to provide the multiple protection measures for the network security,
including four submenus: IP-MAC Binding, ARP Inspection, DoS Defend and 802.1X. Please
configure the functions appropriate to your need.

11.1 IP-MAC Binding

The IP-MAC Binding function allows you to bind the IP address, MAC address, VLAN ID and the
connected Port number of the Host together. Based on the IP-MAC binding table and ARP
Inspection functions, you can control the network access and only allow the Hosts matching the
bound entries to access the network.
The following three IP-MAC Binding methods are supported by the switch.
(1) Manually: You can manually bind the IP address, MAC address, VLAN ID and the Port
number together in the condition that you have got the related information of the Hosts in the
LAN.
(2) Scanning: You can quickly get the information of the IP address, MAC address, VLAN ID
and the connected port number of the Hosts in the LAN via the ARP Scanning function,
and bind them conveniently. You are only requested to enter the range of the IP address
on the ARP Scanning page for the scanning.
(3) DHCP Snooping: You can use DHCP Snooping functions to monitor the process of the
Host obtaining the IP address from DHCP server, and record the IP address, MAC address,
VLAN and the connected Port number of the Host for automatic binding.
These three methods are also considered as the sources of the IP-MAC Binding entries. The
entries from various sources should be different from one another to avoid collision. Among the
entries in collision, only the entry from the source with the highest priority will take effect. These
three sources (Manual, Scanning and Snooping) are in descending order of priority.
The IP-MAC Binding function is implemented on the Binding Table, Manual Binding, ARP
Scanning and DHCP Snooping pages.

11.1.1 Binding Table

On this page, you can view the information of the bound entries.
Choose the menu Network Security→IP-MAC Binding→Binding Table to load the following
page.
Figure 11-1 Binding Table
143

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Tl-sg3216Tl-sg3424Jetstream tl-sg3210Jetstream tl-sg3216Jetstream tl-sg3424

Table of Contents