C
HAPTER
14
| Security Measures
DHCP Snooping
– 342 –
W
EB
I
NTERFACE
To display the binding table for IP Source Guard:
1.
Click Security, IP Source Guard, Dynamic Binding.
2.
Mark the search criteria, and enter the required values.
3.
Click Query
Figure 196: Showing the IP Source Guard Binding Table
DHCP S
NOOPING
The addresses assigned to DHCP clients on insecure ports can be carefully
controlled using the dynamic bindings registered with DHCP Snooping (or
using the static bindings configured with IP Source Guard). DHCP snooping
allows a switch to protect a network from rogue DHCP servers or other
devices which send port-related information to a DHCP server. This
information can be useful in tracking an IP address back to a physical port.
C
OMMAND
U
SAGE
DHCP Snooping Process
◆
Network traffic may be disrupted when malicious DHCP messages are
received from an outside source. DHCP snooping is used to filter DHCP
messages received on a non-secure interface from outside the network
or fire wall. When DHCP snooping is enabled globally and enabled on a
VLAN interface, DHCP messages received on an untrusted interface
from a device not listed in the DHCP snooping table will be dropped.
◆
Table entries are only learned for trusted interfaces. An entry is added
or removed dynamically to the DHCP snooping table when a client
receives or releases an IP address from a DHCP server. Each entry
includes a MAC address, IP address, lease time, VLAN identifier, and
port identifier.
Содержание ES3510MA
Страница 1: ...Management Guide www edge core com 8 Port Layer 2 Fast Ethernet Switch...
Страница 4: ...ABOUT THIS GUIDE 4...
Страница 30: ...CONTENTS 30...
Страница 40: ...FIGURES 40...
Страница 46: ...TABLES 46...
Страница 48: ...SECTION I Getting Started 48...
Страница 72: ...SECTION II Web Configuration 72...
Страница 88: ...CHAPTER 3 Using the Web Interface Navigating the Web Browser Interface 88...
Страница 115: ...CHAPTER 4 Basic Management Tasks Resetting the System 115 Figure 23 Restarting the Switch Regularly...
Страница 116: ...CHAPTER 4 Basic Management Tasks Resetting the System 116...
Страница 154: ...CHAPTER 5 Interface Configuration VLAN Trunking 154...
Страница 216: ...CHAPTER 8 Spanning Tree Algorithm Configuring Interface Settings for MSTP 216...
Страница 350: ...CHAPTER 14 Security Measures DHCP Snooping 350...
Страница 440: ...CHAPTER 17 IP Services Displaying the DNS Cache 440...
Страница 484: ...CHAPTER 19 Using the Command Line Interface CLI Command Groups 484...
Страница 554: ...CHAPTER 21 System Management Commands Switch Clustering 554...
Страница 574: ...CHAPTER 22 SNMP Commands 574...
Страница 582: ...CHAPTER 23 Remote Monitoring Commands 582...
Страница 636: ...CHAPTER 24 Authentication Commands Management IP Filter 636...
Страница 736: ...CHAPTER 29 Port Mirroring Commands RSPAN Mirroring Commands 736...
Страница 816: ...CHAPTER 34 VLAN Commands Configuring Voice VLANs 816...
Страница 830: ...CHAPTER 35 Class of Service Commands Priority Commands Layer 3 and 4 830...
Страница 848: ...CHAPTER 36 Quality of Service Commands 848...
Страница 900: ...CHAPTER 38 LLDP Commands 900...
Страница 910: ...CHAPTER 39 Domain Name Service Commands 910...
Страница 916: ...CHAPTER 40 DHCP Commands DHCP Client 916...
Страница 948: ...CHAPTER 41 IP Interface Commands IPv6 Interface 948...
Страница 950: ...SECTION IV Appendices 950...
Страница 982: ...INDEX 982...
Страница 983: ......
Страница 984: ...ES3510MA E032010 ST R01 149100000046A...