MGS-3712/MGS-3012F User’s Guide
185
C
H A P T E R
23
IP Source Guard
Use IP source guard to filter unauthorized DHCP and ARP packets in your network.
23.1 IP Source Guard Overview
IP source guard uses a binding table to distinguish between authorized and unauthorized
DHCP and ARP packets in your network. A binding contains these key attributes:
• MAC address
• VLAN ID
• IP address
• Port number
When the Switch receives a DHCP or ARP packet, it looks up the appropriate MAC address,
VLAN ID, IP address, and port number in the binding table. If there is a binding, the Switch
forwards the packet. If there is not a binding, the Switch discards the packet.
The Switch builds the binding table by snooping DHCP packets (dynamic bindings) and from
information provided manually by administrators (static bindings).
IP source guard consists of the following features:
• Static bindings. Use this to create static bindings in the binding table.
• DHCP snooping. Use this to filter unauthorized DHCP packets on the network and to
build the binding table dynamically.
• ARP inspection. Use this to filter unauthorized ARP packets on the network.
If you want to use dynamic bindings to filter unauthorized ARP packets (typical
implementation), you have to enable DHCP snooping before you enable ARP inspection.
23.1.1 DHCP Snooping Overview
Use DHCP snooping to filter unauthorized DHCP packets on the network and to build the
binding table dynamically. This can prevent clients from getting IP addresses from
unauthorized DHCP servers.
23.1.1.1 Trusted vs. Untrusted Ports
Every port is either a trusted port or an untrusted port for DHCP snooping. This setting is
independent of the trusted/untrusted setting for ARP inspection. You can also specify the
maximum number for DHCP packets that each port (trusted or untrusted) can receive each
second.
Summary of Contents for MGS-3712
Page 2: ......
Page 7: ...Safety Warnings MGS 3712 MGS 3012F User s Guide 7 ...
Page 8: ...Safety Warnings MGS 3712 MGS 3012F User s Guide 8 ...
Page 20: ...Table of Contents MGS 3712 MGS 3012F User s Guide 20 ...
Page 28: ...List of Tables MGS 3712 MGS 3012F User s Guide 28 ...
Page 30: ...30 ...
Page 38: ...Chapter 2 Hardware Installation and Connection MGS 3712 MGS 3012F User s Guide 38 ...
Page 50: ...50 ...
Page 70: ...Chapter 6 System Status and Port Statistics MGS 3712 MGS 3012F User s Guide 70 ...
Page 82: ...Chapter 7 Basic Setting MGS 3712 MGS 3012F User s Guide 82 ...
Page 84: ...84 ...
Page 132: ...Chapter 15 Link Aggregation MGS 3712 MGS 3012F User s Guide 132 ...
Page 142: ...Chapter 17 Port Security MGS 3712 MGS 3012F User s Guide 142 ...
Page 148: ...Chapter 18 Classifier MGS 3712 MGS 3012F User s Guide 148 Figure 80 Classifier Example ...
Page 153: ...Chapter 19 Policy Rule MGS 3712 MGS 3012F User s Guide 153 Figure 83 Policy Example ...
Page 154: ...Chapter 19 Policy Rule MGS 3712 MGS 3012F User s Guide 154 ...
Page 170: ...Chapter 21 Multicast MGS 3712 MGS 3012F User s Guide 170 ...
Page 184: ...Chapter 22 Authentication Accounting MGS 3712 MGS 3012F User s Guide 184 ...
Page 214: ...Chapter 25 Two Rate Three Color Marker MGS 3712 MGS 3012F User s Guide 214 ...
Page 215: ...215 PART IV IP Application Static Route 217 DHCP 221 ...
Page 216: ...216 ...
Page 220: ...Chapter 26 Static Route MGS 3712 MGS 3012F User s Guide 220 ...
Page 228: ...Chapter 27 DHCP MGS 3712 MGS 3012F User s Guide 228 ...
Page 230: ...230 ...
Page 256: ...Chapter 30 Diagnostic MGS 3712 MGS 3012F User s Guide 256 ...
Page 260: ...Chapter 31 Syslog MGS 3712 MGS 3012F User s Guide 260 ...
Page 274: ...274 ...
Page 278: ...Chapter 36 Troubleshooting MGS 3712 MGS 3012F User s Guide 278 ...
Page 286: ...286 ...
Page 290: ...Appendix A Common Services MGS 3712 MGS 3012F User s Guide 290 ...
Page 294: ...Appendix B Legal Information MGS 3712 MGS 3012F User s Guide 294 ...