
Chapter 26 IP Source Guard
XGS-4526/4528F/4728F User’s Guide
262
3
Configure trusted and untrusted ports, and specify the maximum number of DHCP
packets that each port can receive per second.
4
Configure static bindings.
26.1.2 ARP Inspection Overview
Use ARP inspection to filter unauthorized ARP packets on the network. This can
prevent many kinds of man-in-the-middle attacks, such as the one in the following
example.
Figure 116
Example: Man-in-the-middle Attack
In this example, computer B tries to establish a connection with computer A.
Computer X is in the same broadcast domain as computer A and intercepts the
ARP request for computer A. Then, computer X does the following things:
• It pretends to be computer A and responds to computer B.
• It pretends to be computer B and sends a message to computer A.
As a result, all the communication between computer A and computer B passes
through computer X. Computer X can read and alter the information passed
between them.
26.1.2.1 ARP Inspection and MAC Address Filters
When the Switch identifies an unauthorized ARP packet, it automatically creates a
MAC address filter to block traffic from the source MAC address and source VLAN
ID of the unauthorized ARP packet. You can configure how long the MAC address
filter remains in the Switch.
These MAC address filters are different than regular MAC address filters (
• They are stored only in volatile memory.
• They do not use the same space in memory that regular MAC address filters
use.
A
X
B
Summary of Contents for XGS-4528F
Page 2: ......
Page 8: ...Safety Warnings XGS 4526 4528F 4728F User s Guide 8...
Page 24: ...Table of Contents XGS 4526 4528F 4728F User s Guide 24...
Page 25: ...25 PART I User s Guide...
Page 26: ...26...
Page 32: ...Chapter 1 Getting to Know Your Switch XGS 4526 4528F 4728F User s Guide 32...
Page 36: ...Chapter 2 Hardware Installation and Connection XGS 4526 4528F 4728F User s Guide 36...
Page 93: ...93 PART II Technical Reference...
Page 94: ...94...
Page 100: ...Chapter 7 System Status and Port Statistics XGS 4526 4528F 4728F User s Guide 100...
Page 116: ...Chapter 8 Basic Setting XGS 4526 4528F 4728F User s Guide 116...
Page 136: ...Chapter 9 VLAN XGS 4526 4528F 4728F User s Guide 136...
Page 140: ...Chapter 10 Static MAC Forward Setup XGS 4526 4528F 4728F User s Guide 140...
Page 172: ...Chapter 14 Bandwidth Control XGS 4526 4528F 4728F User s Guide 172...
Page 186: ...Chapter 17 Link Aggregation XGS 4526 4528F 4728F User s Guide 186...
Page 196: ...Chapter 18 Port Authentication XGS 4526 4528F 4728F User s Guide 196...
Page 214: ...Chapter 21 Policy Rule XGS 4526 4528F 4728F User s Guide 214...
Page 258: ...Chapter 25 AAA XGS 4526 4528F 4728F User s Guide 258...
Page 282: ...Chapter 26 IP Source Guard XGS 4526 4528F 4728F User s Guide 282...
Page 314: ...Chapter 32 Error Disable XGS 4526 4528F 4728F User s Guide 314...
Page 318: ...Chapter 33 Private VLAN XGS 4526 4528F 4728F User s Guide 318...
Page 322: ...Chapter 34 Static Route XGS 4526 4528F 4728F User s Guide 322...
Page 330: ...Chapter 36 RIP XGS 4526 4528F 4728F User s Guide 330...
Page 386: ...Chapter 43 ARP Learning XGS 4526 4528F 4728F User s Guide 386...
Page 396: ...Chapter 45 Maintenance XGS 4526 4528F 4728F User s Guide 396...
Page 442: ...Chapter 49 Cluster Management XGS 4526 4528F 4728F User s Guide 442...
Page 446: ...Chapter 50 MAC Table XGS 4526 4528F 4728F User s Guide 446...
Page 450: ...Chapter 51 IP Table XGS 4526 4528F 4728F User s Guide 450...
Page 454: ...Chapter 53 Routing Table XGS 4526 4528F 4728F User s Guide 454...
Page 462: ...Chapter 55 Troubleshooting XGS 4526 4528F 4728F User s Guide 462...
Page 472: ...Chapter 56 Product Specifications XGS 4526 4528F 4728F User s Guide 472...
Page 480: ...Appendix B Legal Information XGS 4526 4528F 4728F User s Guide 480...