Source Address Validation
Using the DHCP binding table, Dell Networking OS can perform three types of source address validation
(SAV).
Table 26. Three Types of Source Address Validation
Source Address Validation
Description
IP Source Address Validation
Prevents IP spoofing by forwarding only IP packets
that have been validated against the DHCP binding
table.
DHCP MAC Source Address Validation
Verifies a DHCP packet’s source hardware address
matches the client hardware address field (CHADDR)
in the payload.
IP+MAC Source Address Validation
Verifies that the IP source address and MAC source
address are a legitimate pair.
Enabling IP Source Address Validation
IP source address validation (SAV) prevents IP spoofing by forwarding only IP packets that have been validated
against the DHCP binding table.
A spoofed IP packet is one in which the IP source address is strategically chosen to disguise the attacker. For
example, using ARP spoofing, an attacker can assume a legitimate client’s identity and receive traffic
addressed to it. Then the attacker can spoof the client’s IP address to interact with other clients.
The DHCP binding table associates addresses the DHCP servers assign with the port or the port channel
interface on which the requesting client is attached and the VLAN the client belongs to. When you enable IP
source address validation on a port, the system verifies that the source IP address is one that is associated
with the incoming port and optionally that the client belongs to the permissible VLAN. If an attacker is
impostering as a legitimate client, the source address appears on the wrong ingress port and the system
drops the packet. If the IP address is fake, the address is not on the list of permissible addresses for the port
and the packet is dropped. Similarly, if the IP address does not belong to the permissible VLAN, the packet is
dropped.
To enable IP source address validation, use the following command.
NOTE:
If you enable IP source guard using the
ip dhcp source-address-validation
command and
if there are more entries in the current DHCP snooping binding table than the available CAM space, SAV
may not be applied to all entries. To ensure that SAV is applied correctly to all entries, enable the
ip dhcp
source-address-validation
command before adding entries to the binding table.
• Enable IP source address validation.
INTERFACE mode
ip dhcp source-address-validation
• Enable IP source address validation with VLAN option.
Dynamic Host Configuration Protocol (DHCP)
365
Содержание S4048T
Страница 1: ...Dell Configuration Guide for the S4048T ON System 9 10 0 1 ...
Страница 98: ... saveenv 7 Reload the system uBoot mode reset Management 98 ...
Страница 113: ...Total CFM Pkts 10303 CCM Pkts 0 LBM Pkts 0 LTM Pkts 3 LBR Pkts 0 LTR Pkts 0 802 1ag 113 ...
Страница 411: ...mode transit no disable Force10 Resilient Ring Protocol FRRP 411 ...
Страница 590: ...Figure 67 Inspecting the LAG Configuration Link Aggregation Control Protocol LACP 590 ...
Страница 591: ...Figure 68 Inspecting Configuration of LAG 10 on ALPHA Link Aggregation Control Protocol LACP 591 ...
Страница 594: ...Figure 70 Inspecting a LAG Port on BRAVO Using the show interface Command Link Aggregation Control Protocol LACP 594 ...
Страница 595: ...Figure 71 Inspecting LAG 10 Using the show interfaces port channel Command Link Aggregation Control Protocol LACP 595 ...
Страница 646: ...Figure 87 Configuring Interfaces for MSDP Multicast Source Discovery Protocol MSDP 646 ...
Страница 647: ...Figure 88 Configuring OSPF and BGP for MSDP Multicast Source Discovery Protocol MSDP 647 ...
Страница 648: ...Figure 89 Configuring PIM in Multiple Routing Domains Multicast Source Discovery Protocol MSDP 648 ...
Страница 653: ...Figure 91 MSDP Default Peer Scenario 2 Multicast Source Discovery Protocol MSDP 653 ...
Страница 654: ...Figure 92 MSDP Default Peer Scenario 3 Multicast Source Discovery Protocol MSDP 654 ...
Страница 955: ...Figure 119 Single and Double Tag First byte TPID Match Service Provider Bridging 955 ...
Страница 1179: ...Figure 147 Create Hypervisor Figure 148 Edit Hypervisor Figure 149 Create Transport Connector Virtual Extensible LAN VXLAN 1179 ...