62 |
P a g e
untrusted ports by filtering traffic based on DHCP Snooping Table or manually configured IP
Source Bindings. It helps prevent IP spoofing attacks when a host tries to spoof and use the
IP address of another host.
7.4.1 Port Configuration
In this page, user can make IP & MAC Source Guard Port Configuration. After clicking
''Security
Configure''
>
''IP & MAC
Source
Guard''
>
''Configuration''
, following screen
will appear:
Configuration object and description is:
Summary of Contents for JTD-2886
Page 32: ...32 P a g e Configuration object and description is...
Page 33: ...33 P a g e...
Page 34: ...34 P a g e...
Page 37: ...37 P a g e Configuration object and description is...