420
Configuring IP Source Guard
How to Configure IP Source Guard
Configuring IP Source Guard for Static Hosts on a Layer 2 Access Port
4.
exit
Returns to global configuration mode.
5.
ip source binding
mac-address
vlan
vlan-id ip-address
inteface
interface-id
Adds a static IP source binding.
Enter this command for each static binding.
6.
end
Returns to privileged EXEC mode.
Command
Purpose
Command
Purpose
1.
configure terminal
Enters global configuration mode.
2.
ip device tracking
Opens the IP host table, and globally enables IP device
tracking.
3.
interface
interface-id
Enters interface configuration mode.
4.
switchport mode access
Configures a port as access.
5.
switchport access vlan
vlan-id
Configures the VLAN for this port.
6.
ip verify source tracking port-security
Enables IPSG for static hosts with MAC address filtering.
Note:
When you enable both IPSG and port security by
using the
ip verify source port-security
interface
configuration command:
• The DHCP server must support option-82, or
the client is not assigned an IP address.
• The MAC address in the DHCP packet is not
learned as a secure address. The MAC address
of the DHCP client is learned as a secure
address only when the switch receives
non-DHCP data traffic.
7.
ip device tracking maximum
number
Specifies a maximum limit for the number of static IPs
that the IP device tracking table allows on the port. The
range is 1to 10. The maximum number is 10.
Note:
You must configure the
ip device tracking
maximum
limit-number
interface configuration
command.
8.
switchport port-security
(Optional) Activates port security for this port.
9.
switchport port-security maximum
value
(Optional) Specifies a maximum of MAC addresses for
this port.
Содержание IE 4000
Страница 12: ...8 Configuration Overview Default Settings After Initial Switch Configuration ...
Страница 52: ...48 Configuring Interfaces Monitoring and Maintaining the Interfaces ...
Страница 108: ...104 Configuring Switch Clusters Additional References ...
Страница 128: ...124 Performing Switch Administration Additional References ...
Страница 130: ...126 Configuring PTP ...
Страница 140: ...136 Configuring CIP Additional References ...
Страница 146: ...142 Configuring SDM Templates Configuration Examples for Configuring SDM Templates ...
Страница 192: ...188 Configuring Switch Based Authentication Additional References ...
Страница 244: ...240 Configuring IEEE 802 1x Port Based Authentication Additional References ...
Страница 274: ...270 Configuring SGT Exchange Protocol over TCP SXP and Layer 3 Transport Configuring Cisco TrustSec Caching ...
Страница 298: ...294 Configuring VLANs Additional References ...
Страница 336: ...332 Configuring STP Additional References ...
Страница 408: ...404 Configuring DHCP Additional References ...
Страница 450: ...446 Configuring IGMP Snooping and MVR Additional References ...
Страница 490: ...486 Configuring SPAN and RSPAN Additional References ...
Страница 502: ...498 Configuring Layer 2 NAT ...
Страница 559: ...555 Configuring Network Security with ACLs How to Configure Network Security with ACLs Creating a Numbered Extended ACL ...
Страница 770: ...766 Configuring IPv6 MLD Snooping Related Documents ...
Страница 930: ...926 Configuring IP Unicast Routing Related Documents ...
Страница 956: ...952 Configuring IPv6 Unicast Routing Configuring IPv6 network 2010 AB8 2 48 network 2010 AB8 3 48 exit address family ...
Страница 976: ...972 Configuring Cisco IOS IP SLAs Operations Additional References ...
Страница 978: ...974 Dying Gasp ...
Страница 990: ...986 Configuring Enhanced Object Tracking Monitoring Enhanced Object Tracking ...
Страница 994: ...990 Configuring MODBUS TCP Displaying MODBUS TCP Information ...
Страница 996: ...992 Ethernet CFM ...
Страница 1030: ...1026 Working with the Cisco IOS File System Configuration Files and Software Images Working with Software Images ...
Страница 1066: ...1062 Using an SD Card SD Card Alarms ...