C
HAPTER
26
| General Security Measures
IP Source Guard
– 781 –
◆
Filtering rules are implemented as follows:
■
If DHCP snooping is disabled (see
page 770
), IP source guard will
check the VLAN ID, source IP address, port number, and source
MAC address (for the sip-mac option). If a matching entry is found
in the binding table and the entry type is static IP source guard
binding, the packet will be forwarded.
■
If the DHCP snooping is enabled, IP source guard will check the
VLAN ID, source IP address, port number, and source MAC address
(for the sip-mac option). If a matching entry is found in the binding
table and the entry type is static IP source guard binding, or
dynamic DHCP snooping binding, the packet will be forwarded.
■
If IP source guard if enabled on an interface for which IP source
bindings (dynamically learned via DHCP snooping or manually
configured) are not yet configured, the switch will drop all IP traffic
on that port, except for DHCP packets.
■
Only unicast addresses are accepted for static bindings.
E
XAMPLE
This example enables IP source guard on port 5.
Console(config)#interface ethernet 1/5
Console(config-if)#ip source-guard sip
Console(config-if)#
R
ELATED
C
OMMANDS
ip source-guard binding (778)
ip dhcp snooping (770)
ip dhcp snooping vlan (775)
ip source-guard
max-binding
This command sets the maximum number of entries that can be bound to
an interface. Use the
no
form to restore the default setting.
S
YNTAX
ip source-guard max-binding
number
no
ip source-guard
max-binding
number
- The maximum number of IP addresses that can be
mapped to an interface in the binding table. (Range: 1-5)
D
EFAULT
S
ETTING
5
C
OMMAND
M
ODE
Interface Configuration (Ethernet)
Summary of Contents for ECS4810-12M Layer 2
Page 1: ...Management Guide www edge core com ECS4810 12M Layer 2 Gigabit Ethernet Switch...
Page 2: ......
Page 4: ......
Page 6: ...ABOUT THIS GUIDE 6...
Page 54: ...SECTION I Getting Started 54...
Page 64: ...CHAPTER 1 Introduction System Defaults 64...
Page 82: ...CHAPTER 2 Initial Switch Configuration Managing System Files 82...
Page 84: ...SECTION II Web Configuration 84...
Page 102: ...CHAPTER 3 Using the Web Interface Navigating the Web Browser Interface 102...
Page 206: ...CHAPTER 6 VLAN Configuration Configuring VLAN Mirroring 206...
Page 256: ...CHAPTER 11 Class of Service Layer 3 4 Priority Settings 256...
Page 378: ...CHAPTER 14 Security Measures DHCP Snooping 378...
Page 520: ...CHAPTER 16 IP Configuration Setting the Switch s IP Address IP Version 6 520...
Page 528: ...CHAPTER 17 IP Services Displaying the DNS Cache 528...
Page 586: ...CHAPTER 19 Using the Command Line Interface CLI Command Groups 586...
Page 676: ...CHAPTER 22 SNMP Commands 676...
Page 684: ...CHAPTER 23 Remote Monitoring Commands 684...
Page 816: ...CHAPTER 27 Access Control Lists ACL Information 816...
Page 866: ...CHAPTER 30 Port Mirroring Commands RSPAN Mirroring Commands 866...
Page 884: ...CHAPTER 32 Automatic Traffic Control Commands 884...
Page 890: ...CHAPTER 33 Address Table Commands 890...
Page 986: ...CHAPTER 37 Class of Service Commands Priority Commands Layer 3 and 4 986...
Page 1006: ...CHAPTER 38 Quality of Service Commands 1006...
Page 1068: ...CHAPTER 39 Multicast Filtering Commands Multicast VLAN Registration 1068...
Page 1092: ...CHAPTER 40 LLDP Commands 1092...
Page 1134: ...CHAPTER 41 CFM Commands 1134...
Page 1154: ...CHAPTER 43 Domain Name Service Commands 1154...
Page 1160: ...CHAPTER 44 DHCP Commands DHCP Client 1160...
Page 1194: ...CHAPTER 45 IP Interface Commands IPv6 Interface 1194...
Page 1196: ...SECTION IV Appendices 1196...
Page 1202: ...APPENDIX A Software Specifications Management Information Bases 1202...
Page 1224: ...COMMAND LIST 1224...
Page 1234: ...INDEX 1234...
Page 1235: ......