Chapter 24 IP Source Guard
GS2200-48 User’s Guide
209
• They appear only in the ARP Inspection screens and commands, not in the
MAC Address Filter screens and commands.
24.1.2.2 Trusted vs. Untrusted Ports
Every port is either a trusted port or an untrusted port for ARP inspection. This
setting is independent of the trusted/untrusted setting for DHCP snooping. You
can also specify the maximum rate at which the Switch receives ARP packets on
untrusted ports.
The Switch does not discard ARP packets on trusted ports for any reason.
The Switch discards ARP packets on untrusted ports in the following situations:
• The sender’s information in the ARP packet does not match any of the current
bindings.
• The rate at which ARP packets arrive is too high.
24.1.2.3 Syslog
The Switch can send syslog messages to the specified syslog server (
) when it forwards or discards ARP packets. The Switch can
consolidate log messages and send log messages in batches to make this
mechanism more efficient.
24.1.2.4 Configuring ARP Inspection
Follow these steps to configure ARP inspection on the Switch.
1
Configure DHCP snooping. See
Note: It is recommended you enable DHCP snooping at least one day before you
enable ARP inspection so that the Switch has enough time to build the binding
table.
2
Enable ARP inspection on each VLAN.
3
Configure trusted and untrusted ports, and specify the maximum number of ARP
packets that each port can receive per second.
24.2 IP Source Guard
Use this screen to look at the current bindings for DHCP snooping and ARP
inspection. Bindings are used by DHCP snooping and ARP inspection to distinguish
between authorized and unauthorized packets in the network. The Switch learns
Summary of Contents for GS2200-48
Page 2: ......
Page 8: ...Safety Warnings GS2200 48 User s Guide 8 ...
Page 22: ...22 ...
Page 28: ...Chapter 1 Getting to Know Your Switch GS2200 48 User s Guide 28 ...
Page 32: ...Chapter 2 Hardware Installation and Connection GS2200 48 User s Guide 32 ...
Page 40: ...40 ...
Page 62: ...Chapter 6 System Status and Port Statistics GS2200 48 User s Guide 62 ...
Page 76: ...Chapter 7 Basic Setting GS2200 48 User s Guide 76 ...
Page 78: ...78 ...
Page 102: ...Chapter 9 Static MAC Forward Setup GS2200 48 User s Guide 102 ...
Page 122: ...Chapter 11 Spanning Tree Protocol GS2200 48 User s Guide 122 ...
Page 126: ...Chapter 12 Bandwidth Control GS2200 48 User s Guide 126 ...
Page 148: ...Chapter 17 Port Security GS2200 48 User s Guide 148 ...
Page 156: ...Chapter 18 Classifier GS2200 48 User s Guide 156 ...
Page 164: ...Chapter 19 Policy Rule GS2200 48 User s Guide 164 ...
Page 214: ...Chapter 24 IP Source Guard GS2200 48 User s Guide 214 Figure 98 DHCP Snooping ...
Page 236: ...236 ...
Page 270: ...270 ...
Page 278: ...Chapter 31 Maintenance GS2200 48 User s Guide 278 ...
Page 304: ...Chapter 34 Syslog GS2200 48 User s Guide 304 ...
Page 312: ...Chapter 35 Cluster Management GS2200 48 User s Guide 312 ...
Page 316: ...Chapter 36 MAC Table GS2200 48 User s Guide 316 ...
Page 320: ...Chapter 37 IP Table GS2200 48 User s Guide 320 ...
Page 324: ...Chapter 39 Routing Table GS2200 48 User s Guide 324 ...
Page 327: ...327 PART VI Product Specifications Product Specifications 329 ...
Page 328: ...328 ...
Page 336: ...Chapter 41 Product Specifications GS2200 48 User s Guide 336 ...
Page 338: ...338 ...
Page 352: ...Appendix B Legal Information GS2200 48 User s Guide 352 ...
Page 362: ...Index GS2200 48 User s Guide 362 ...