Ip Source Guard; Configuring Ports For Ip Source Guard - Edge-Core ECS4610-24F Management Manual

24-port layer 3 gigabit ethernet switch
Hide thumbs Also See for ECS4610-24F:
Table of Contents

Advertisement

IP S
G
OURCE
UARD
C
P
ONFIGURING
ORTS
IP S
FOR
OURCE
G
UARD
W
I
EB
NTERFACE
To display port authenticator statistics for 802.1X:
Click Security, Port Authentication.
1.
Select Show Statistics from the Step list.
2.
Click Authenticator.
3.
Figure 174: Showing Statistics for 802.1X Port Authenticator
IP Source Guard is a security feature that filters IP traffic on network
interfaces based on manually configured entries in the IP Source Guard
table, or dynamic entries in the DHCP Snooping table when enabled (see
"DHCP Snooping" on page
traffic attacks caused when a host tries to use the IP address of a neighbor
to access the network. This section describes commands used to configure

IP Source Guard.

Use the Security > IP Source Guard > Port Configuration page to set the
filtering type based on source IP address, or source IP address and MAC
address pairs.
IP Source Guard is used to filter traffic on an insecure port which receives
messages from outside the network or fire wall, and therefore may be
subject to traffic attacks caused by a host trying to use the IP address of a
neighbor.
CLI R
EFERENCES
"ip source-guard" on page 735
– 321 –
C
HAPTER
326). IP source guard can be used to prevent
| Security Measures
13
IP Source Guard

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents