
Chapter 9
| General Security Measures
IPv4 Source Guard
– 335 –
Command Mode
Interface Configuration (Ethernet)
Command Usage
◆
This command sets the maximum number of address entries that can be
mapped to an interface in the binding table for the specified mode (ACL
binding table or MAC address table) including dynamic entries discovered by
DHCP snooping and static entries set by the
command.
◆
The maximum binding for ACL mode restricts the number of “active” entries
per port. If binding entries exceed the maximum number in IP source guard,
only the maximum number of binding entries will be set. Dynamic binding
entries exceeding the maximum number will be created but will not be active.
◆
The maximum binding for MAC mode restricts the number of MAC addresses
learned per port. Authenticated IP traffic with different source MAC addresses
cannot be learned if it would exceed this maximum number.
Example
This example sets the maximum number of allowed entries for ACL mode in the
binding table for port 5 to one entry. The mode is not specified, and therefore
defaults to the ACL binding table.
Console(config)#interface ethernet 1/5
Console(config-if)#ip source-guard max-binding 1
Console(config-if)#
ip source-guard mode
This command sets the source-guard learning mode to search for addresses in the
ACL binding table or the MAC address binding table. Use the
no
form to restore the
default setting.
Syntax
ip source-guard mode
{
acl
|
mac
}
no
ip source-guard
mode
mode
- Specifies the learning mode.
acl
- Searches for addresses in the ACL binding table.
mac
- Searches for addresses in the MAC address binding table.
Default Setting
ACL
Command Mode
Interface Configuration (Ethernet)
Содержание ECS4120-28F
Страница 36: ...Contents 36...
Страница 38: ...Figures 38...
Страница 46: ...Section I Getting Started 46...
Страница 70: ...Chapter 1 Initial Switch Configuration Setting the System Clock 70...
Страница 86: ...Chapter 2 Using the Command Line Interface CLI Command Groups 86...
Страница 202: ...Chapter 5 SNMP Commands Additional Trap Commands 202...
Страница 210: ...Chapter 6 Remote Monitoring Commands 210...
Страница 216: ...Chapter 7 Flow Sampling Commands 216...
Страница 278: ...Chapter 8 Authentication Commands PPPoE Intermediate Agent 278...
Страница 360: ...Chapter 9 General Security Measures Port based Traffic Segmentation 360...
Страница 384: ...Chapter 10 Access Control Lists ACL Information 384...
Страница 424: ...Chapter 11 Interface Commands Power Savings 424...
Страница 446: ...Chapter 13 Power over Ethernet Commands 446...
Страница 456: ...Chapter 14 Port Mirroring Commands RSPAN Mirroring Commands 456...
Страница 488: ...Chapter 17 UniDirectional Link Detection Commands 488...
Страница 494: ...Chapter 18 Address Table Commands 494...
Страница 554: ...Chapter 20 ERPS Commands 554...
Страница 620: ...Chapter 22 Class of Service Commands Priority Commands Layer 3 and 4 620...
Страница 638: ...Chapter 23 Quality of Service Commands 638...
Страница 772: ...Chapter 25 LLDP Commands 772...
Страница 814: ...Chapter 26 CFM Commands Delay Measure Operations 814...
Страница 826: ...Chapter 27 OAM Commands 826 1 1 00 12 CF 6A 07 F6 000084 Enabled Disabled Enabled Disabled Console...
Страница 836: ...Chapter 28 Domain Name Service Commands 836...
Страница 848: ...Chapter 29 DHCP Commands DHCP Relay Option 82 848...
Страница 902: ...Section III Appendices 902...
Страница 916: ...Glossary 916...
Страница 926: ...CLI Commands 926...
Страница 937: ......
Страница 938: ...E092017 CS R02...