Raisecom
ISCOM2600G-HI (A) Series Configuration Guide
10 Security
Raisecom Proprietary and Confidential
Copyright © Raisecom Technology Co., Ltd.
439
IP Source Guard binding entry
IP Source Guard is used to match packet characteristics, including source IP address, source
MAC address, and VLAN tags, and can support the interface to be combined with the
following characteristics (hereinafter referred to as binding entries):
InIP
InIP+MAC
InIP+VLAN
InIP+MAC+VLAN
According to the generation mode of binding entries, IP Source Guard can be divided into
static binding and dynamic binding:
Static binding: configure binding information manually and generate binding entry to
complete the interface control, which fits for the case where the number of hosts is small
or where you need to perform separate binding on a single host.
Dynamic binding: obtain binding information automatically from DHCP Snooping to
complete the interface control, which fits for the case where there are many hosts and
you need to adopt DHCP to perform dynamic host configurations. Dynamic binding can
effectively prevent IP address conflict and embezzlement.
Principles of IP Source Guard
Principles of IP Source Guard are to create an IP source binding table within the
ISCOM2600G-HI series switch. The IP source binding table is taken as the basis for each
interface to test received data packets. Figure 10-9 shows principles of IP Source Guard.
If the received IP packets meet the relationship of Port/IP/MAC/VLAN binding entries
in IP source binding table, forward these packets.
If the received IP packets are DHCP data packets, forward these packets.
Otherwise, discard these packets.
Figure 10-9
Principles of IP Source Guard
Before forwarding IP packets, the ISCOM2600G-HI series switch compares the source IP
address, source MAC address, interface ID, and VLAN ID of the IP packets with the binding
table. If the information matches, it indicates that the user is legal and the packets are