Raisecom
ISCOM2600G-HI (A) Series Configuration Guide
10 Security
Raisecom Proprietary and Confidential
Copyright © Raisecom Technology Co., Ltd.
440
permitted to forward normally. Otherwise, the user is an attacker and the IP packets are
discarded.
10.8.2 Preparing for configurations
Scenario
There are often some IP source spoofing attacks on the network. For example, the attacker
forges legal users to send IP packets to the server, or the attacker forges the source IP address
of another user to communicate. This prevents legal users from accessing network services
normally.
With IP Source Guard binding, you can filter and control packets forwarded by the interface,
prevent the illegal packets from passing through the interface, thus to restrict the illegal use of
network resources and improve the interface security.
Prerequisite
Enable DHCP Snooping if there are DHCP users.
10.8.3 Default configurations of IP Source Guard
Default configurations of IP Source Guard are as below.
Function
Default value
IP Source Guard static binding
Disable
IP Source Guard dynamic binding
Disable
Interface trust status
Untrusted
10.8.4 Configuring interface trust status of IP Source Guard
Configure the interface trust status of IP Source Guard for the ISCOM2600G-HI series switch
as below.
Step
Command
Description
1
Raisecom#config
Enter global configuration mode.
2
Raisecom(config)#
interface
interface-type
interface-number
Enter physical layer interface configuration mode.
3
Raisecom(config-
gigaethernet1/1/p
ort)#ip verify
source trust
(Optional) configure the interface to a trusted interface.
Use the
no ip verify source trust
command to configure
the interface as an untrusted interface. In this case, all
packets, except DHCP packets and IP packets that meet
binding relation, are not forwarded. When the interface
is in trusted status, all packets are forwarded normally.