
C
HAPTER
14
| Security Measures
IP Source Guard
– 352 –
■
SIP-MAC
– Enables traffic filtering based on IP addresses and
corresponding MAC addresses stored in the binding table.
◆
Max Binding Entry
– The maximum number of entries that can be
bound to an interface. (Range: 1-5; Default: 5)
This parameter sets the maximum number of address entries that can
be mapped to an interface in the binding table, including both dynamic
entries discovered by DHCP snooping (see
) and static entries set by IP source guard (see
Static Bindings for IP Source Guard" on page 352
W
EB
I
NTERFACE
To set the IP Source Guard filter for ports:
1.
Click Security, IP Source Guard, Port Configuration.
2.
Set the required filtering type for each port.
3.
Click Apply
Figure 197: Setting the Filter Type for IP Source Guard
C
ONFIGURING
S
TATIC
B
INDINGS
FOR
IP
S
OURCE
G
UARD
Use the Security > IP Source Guard > Static Configuration page to bind a
static address to a port. Table entries include a MAC address, IP address,
lease time, entry type (Static, Dynamic), VLAN identifier, and port
identifier. All static entries are configured with an infinite lease time, which
is indicated with a value of zero in the table.
CLI R
EFERENCES
◆
"ip source-guard binding" on page 682
C
OMMAND
U
SAGE
◆
Static addresses entered in the source guard binding table are
automatically configured with an infinite lease time. Dynamic entries
learned via DHCP snooping are configured by the DHCP server itself.
◆
Static bindings are processed as follows:
■
If there is no entry with the same VLAN ID and MAC address, a new
entry is added to the binding table using the type “static IP source
guard binding.”
Summary of Contents for ES3510MA-DC
Page 1: ...Management Guide www edge core com 8 Port Layer 2 Fast Ethernet Switch...
Page 2: ......
Page 4: ......
Page 6: ...ABOUT THIS GUIDE 6...
Page 44: ...FIGURES 44...
Page 50: ...TABLES 50...
Page 52: ...SECTION I Getting Started 52...
Page 62: ...CHAPTER 1 Introduction System Defaults 62...
Page 80: ...CHAPTER 2 Initial Switch Configuration Managing System Files 80...
Page 82: ...SECTION II Web Configuration 82...
Page 98: ...CHAPTER 3 Using the Web Interface Navigating the Web Browser Interface 98...
Page 126: ...CHAPTER 4 Basic Management Tasks Resetting the System 126...
Page 164: ...CHAPTER 5 Interface Configuration VLAN Trunking 164 Figure 57 Configuring VLAN Trunking...
Page 202: ...CHAPTER 7 Address Table Settings Configuring MAC Address Mirroring 202...
Page 452: ...CHAPTER 17 IP Services Displaying the DNS Cache 452...
Page 498: ...CHAPTER 19 Using the Command Line Interface CLI Command Groups 498...
Page 588: ...CHAPTER 22 SNMP Commands 588...
Page 596: ...CHAPTER 23 Remote Monitoring Commands 596...
Page 650: ...CHAPTER 24 Authentication Commands Management IP Filter 650...
Page 738: ...CHAPTER 27 Interface Commands 738...
Page 760: ...CHAPTER 29 Port Mirroring Commands RSPAN Mirroring Commands 760...
Page 782: ...CHAPTER 32 Address Table Commands 782...
Page 810: ...CHAPTER 33 Spanning Tree Commands 810...
Page 862: ...CHAPTER 35 VLAN Commands Configuring Voice VLANs 862...
Page 876: ...CHAPTER 36 Class of Service Commands Priority Commands Layer 3 and 4 876...
Page 932: ...CHAPTER 38 Multicast Filtering Commands Multicast VLAN Registration 932...
Page 956: ...CHAPTER 39 LLDP Commands 956...
Page 1020: ...CHAPTER 42 Domain Name Service Commands 1020...
Page 1026: ...CHAPTER 43 DHCP Commands DHCP Client 1026...
Page 1058: ...CHAPTER 44 IP Interface Commands IPv6 Interface 1058...
Page 1060: ...SECTION IV Appendices 1060...
Page 1066: ...APPENDIX A Software Specifications Management Information Bases 1066...
Page 1088: ...COMMAND LIST 1088...
Page 1097: ......