![Atop EH9711 Series Скачать руководство пользователя страница 78](http://html1.mh-extra.com/html/atop/eh9711-series/eh9711-series_user-manual_3004814078.webp)
Industrial Managed
Ethernet Switch – EH9711
User Manual
Page
78
of
223
Table 2.48 Descriptions of Network IP Source Guard Configuration
Label
Description
Factory
Default
IP Source Guard Configuration
Mode
Enable the Global IP Source Guard or disable the Global IP Source Guard. All
configured ACEs will be lost when the mode is enabled.
Disabled
Port Mode Configuration
Mode
Specify IP Source Guard is enabled on which ports. Only when both Global
Mode and Port Mode on a given port are enabled, IP Source Guard is enabled on
this given port.
Disabled
Max Dynamic Clients
Specify the maximum number of dynamic clients that can be learned on given
port. This value can be 0, 1, 2 or unlimited. If the port mode is enabled and the
value of max dynamic client is equal to 0, it means only allow the IP packets
forwarding that are matched in static entries on the specific port.
Unlimited
Click the
Save
buttons to save changes. Click
Reset
buttons to undo any changes made locally and revert to previously saved
values. Click
Translate dynamic to static
button to translate all dynamic entries to static entries.
2.5.2.7.2
IP Source Guard Static Table
The user can configure staic
IP Source Guard Static
rules in this webpage. The user can add a new entry to the
IP Soruce
Guard table
as shown in Figure 2.61. The maximum number of rules is 112 on the switch. Table 2.49 summarizes the
column labels for Static IP Source Guard Table.
Figure 2.61 Webpage
to Configure Network IP Source Guard Static Table
Table 2.49 Descriptions of Network IP Source Guard Static
Label
Description
Factory Default
Delete
Click entry
Delete
button to delete the entry. It will be deleted during the next
save.
Port
The logical port for the settings.
1
VLAN ID
The VLAN Id for the entry.
Null
IP Address
Allowed Source IP address.
Null
MAC Address
Allowed Source MAC address.
Null
Click
Add New Entry
button to add a new entry to the Static IP Source Guard table. Click
Save
button to save changes.
Click
Reset
button to undo any changes made locally and revert to previously saved values.
2.5.2.8
ARP Inspection
ARP Inspection
is a secure feature. Several types of attacks can be launched against a host or devices connected to Layer 2
networks by "poisoning" the ARP caches. For example, man-in-the-middle attack occurs when a malicious node intercepts
packets intended for other nodes by poisoning the ARP caches of its unsuspecting neighbours. To create the attack, the
malicious node sends ARP requests or responses mapping another node’s IP address to its own MAC address. This feature is
used to block such attacks. Only valid ARP requests and responses can go through the switch device. Figure 2.62 shows the