
Chapter 9
| General Security Measures
IPv4 Source Guard
– 331 –
ip source-guard
binding
This command adds a static address to the source-guard ACL or MAC address
binding table. Use the
no
form to remove a static entry.
Syntax
ip source-guard binding
[
mode
{
acl
|
mac
}]
mac-address
vlan
vlan-id ip-address
interface ethernet
unit/port-list
no
ip source-guard
binding
[
mode
{
acl
|
mac
}]
mac-address
vlan
vlan-id
mode
- Specifies the binding mode.
acl
- Adds binding to ACL table.
mac
- Adds binding to MAC address table.
mac-address
- A valid unicast MAC address.
vlan-id
- ID of a configured VLAN for an ACL filtering table or a range of
VLANs for a MAC address filtering table. To specify a list separate
nonconsecutive VLAN identifiers with a comma and no spaces; use a
hyphen to designate a range of IDs. (Range: 1-4094)
ip-address
- A valid unicast IP address, including classful types A, B or C.
unit
- Unit identifier. (Range: 1)
port-list
- Physical port number or list of port numbers. Separate
nonconsecutive port numbers with a comma and no spaces; or use a
hyphen to designate a range of port numbers. (Range: 1-28/52)
Default Setting
No configured entries
Command Mode
Global Configuration
Command Usage
◆
If the binding mode is not specified in this command, the entry is bound to the
ACL table by default.
◆
Table entries include a MAC address, IP address, lease time, entry type (Static-IP-
SG-Binding, Dynamic-DHCP-Binding), VLAN identifier, and port identifier.
◆
All static entries are configured with an infinite lease time, which is indicated
with a value of zero by the
command (
Shows whether source guard is enabled or disabled on
each interface
PE
Shows the source guard binding table
PE
Table 62: IPv4 Source Guard Commands
Command
Function
Mode
Summary of Contents for ECS4120-28F
Page 36: ...Contents 36...
Page 38: ...Figures 38...
Page 46: ...Section I Getting Started 46...
Page 70: ...Chapter 1 Initial Switch Configuration Setting the System Clock 70...
Page 86: ...Chapter 2 Using the Command Line Interface CLI Command Groups 86...
Page 202: ...Chapter 5 SNMP Commands Additional Trap Commands 202...
Page 210: ...Chapter 6 Remote Monitoring Commands 210...
Page 216: ...Chapter 7 Flow Sampling Commands 216...
Page 278: ...Chapter 8 Authentication Commands PPPoE Intermediate Agent 278...
Page 360: ...Chapter 9 General Security Measures Port based Traffic Segmentation 360...
Page 384: ...Chapter 10 Access Control Lists ACL Information 384...
Page 424: ...Chapter 11 Interface Commands Power Savings 424...
Page 446: ...Chapter 13 Power over Ethernet Commands 446...
Page 456: ...Chapter 14 Port Mirroring Commands RSPAN Mirroring Commands 456...
Page 488: ...Chapter 17 UniDirectional Link Detection Commands 488...
Page 494: ...Chapter 18 Address Table Commands 494...
Page 554: ...Chapter 20 ERPS Commands 554...
Page 620: ...Chapter 22 Class of Service Commands Priority Commands Layer 3 and 4 620...
Page 638: ...Chapter 23 Quality of Service Commands 638...
Page 772: ...Chapter 25 LLDP Commands 772...
Page 814: ...Chapter 26 CFM Commands Delay Measure Operations 814...
Page 836: ...Chapter 28 Domain Name Service Commands 836...
Page 848: ...Chapter 29 DHCP Commands DHCP Relay Option 82 848...
Page 902: ...Section III Appendices 902...
Page 916: ...Glossary 916...
Page 926: ...CLI Commands 926...
Page 937: ......
Page 938: ...E092017 CS R02...