Chapter 12
| Security Measures
IPv4 Source Guard
– 357 –
IPv4 Source Guard
IPv4 Source Guard is a security feature that filters IP traffic on network interfaces
based on manually configured entries in the IP Source Guard table, or dynamic
entries in the DHCP Snooping table when enabled (see
). IP source guard can be used to prevent traffic attacks caused when a
host tries to use the IPv4 address of a neighbor to access the network. This section
describes how to configure IPv4 Source Guard.
Configuring Ports
for IPv4 Source Guard
Use the Security > IP Source Guard > Port Configuration page to set the filtering
type based on source IP address, or source IP address and MAC address pairs. It also
specifies lookup within the ACL binding table or the MAC address binding table, as
well as the maximum number of allowed binding entries for the lookup tables.
IP Source Guard is used to filter traffic on an insecure port which receives messages
from outside the network or fire wall, and therefore may be subject to traffic attacks
caused by a host trying to use the IP address of a neighbor.
Command Usage
Filter Type
◆
Setting source guard mode to SIP (Source IP) or SIP-MAC (Source IP and MAC)
enables this function on the selected port. Use the SIP option to check the
VLAN ID, source IP address, and port number against all entries in the binding
table. Use the SIP-MAC option to check these same parameters, plus the source
MAC address. If no matching entry is found, the packet is dropped.
Note:
Multicast addresses cannot be used by IP Source Guard.
◆
When enabled, traffic is filtered based upon dynamic entries learned via DHCP
snooping (see
), or static addresses configured in
the source guard binding table.
◆
If IP source guard is enabled, an inbound packet’s IP address (SIP option) or
both its IP address and corresponding MAC address (SIP-MAC option) will be
checked against the binding table. If no matching entry is found, the packet
will be dropped.
◆
An entry with same MAC address and a diferent VLAN ID cannot be added to
the binding table .
◆
Filtering rules are implemented as follows:
■
If DHCP snooping is disabled (see
), IP source guard will check the
VLAN ID, source IP address, port number, and source MAC address (for the
SIP-MAC option). If a matching entry is found in the binding table and the
entry type is static IP source guard binding, the packet will be forwarded.
Summary of Contents for GTL-2881
Page 34: ...Section I Getting Started 34 ...
Page 48: ...Section II Web Configuration 48 Unicast Routing on page 651 ...
Page 151: ...Chapter 4 Interface Configuration VLAN Trunking 151 Figure 69 Configuring VLAN Trunking ...
Page 152: ...Chapter 4 Interface Configuration VLAN Trunking 152 ...
Page 230: ...Chapter 8 Congestion Control Automatic Traffic Control 230 ...
Page 596: ...Chapter 14 Multicast Filtering Multicast VLAN Registration for IPv6 596 ...
Page 620: ...Chapter 15 IP Configuration Setting the Switch s IP Address IP Version 6 620 ...
Page 672: ...Section III Appendices 672 ...
Page 678: ...Appendix A Software Specifications Management Information Bases 678 ...
Page 688: ...Appendix C License Statement GPL Code Statement Notification of Compliance 688 ...
Page 696: ...Glossary 696 ...
Page 706: ...GTL 2881 GTL 2882 E112016 ST R01 ...