Chapter 18 IP Source Guard
GS1510 Series User’s Guide
104
IP source guard consists of the following features:
• DHCP snooping. Use this to filter unauthorized DHCP packets on the network
and to build the binding table dynamically.
• ARP inspection. Use this to filter unauthorized ARP packets on the network.
• Static bindings. Use this to create static bindings in the binding table.
If you want to use dynamic bindings to filter unauthorized ARP packets (typical
implementation), you have to enable DHCP snooping before you enable ARP
inspection.
18.3.1 DHCP Snooping Overview
Use DHCP snooping to filter unauthorized DHCP packets on the network and to
build the binding table dynamically. This can prevent clients from getting IP
addresses from unauthorized DHCP servers.
18.3.1.1 Trusted vs. Untrusted Ports
Every port is either a trusted port or an untrusted port for DHCP snooping. This
setting is independent of the trusted/untrusted setting for ARP inspection.
Trusted ports are connected to DHCP servers or other switches. The Switch learns
dynamic bindings from trusted ports.
Note: The Switch will drop all DHCP requests if you enable DHCP snooping and there
are no trusted ports.
Untrusted ports are connected to subscribers. The Switch discards DHCP packets
from untrusted ports in the following situations:
• The packet is a DHCP server packet (for example, OFFER, ACK, or NACK).
• The source MAC address and source IP address in the packet do not match any
of the current bindings.
• The packet is a RELEASE or DECLINE packet, and the source MAC address and
source port do not match any of the current bindings.
• The rate at which DHCP packets arrive is too high.
18.3.1.2 DHCP Snooping Database
The Switch stores the binding table in volatile memory. If the Switch restarts, it
loads static bindings from permanent memory but loses the dynamic bindings, in
which case the devices in the network have to send DHCP requests again.
Содержание GS1510-16 -
Страница 2: ......
Страница 8: ...Safety Warnings GS1510 Series User s Guide 8...
Страница 10: ...Contents Overview GS1510 Series User s Guide 10...
Страница 18: ...18...
Страница 26: ...Chapter 2 Hardware Installation and Connection GS1510 Series User s Guide 26...
Страница 34: ...34...
Страница 60: ...Chapter 9 Port Settings GS1510 Series User s Guide 60...
Страница 62: ...62...
Страница 76: ...Chapter 12 IGMP Snooping GS1510 Series User s Guide 76...
Страница 92: ...Chapter 15 QoS GS1510 Series User s Guide 92...
Страница 100: ...Chapter 17 Spanning Tree Protocol GS1510 Series User s Guide 100...
Страница 102: ...102...
Страница 116: ...Chapter 18 IP Source Guard GS1510 Series User s Guide 116...
Страница 142: ...Chapter 22 SNMP GS1510 Series User s Guide 142...
Страница 145: ...145 PART V Troubleshooting Product Specifications Troubleshooting 147 Product Specifications 151...
Страница 146: ...146...
Страница 150: ...Chapter 24 Troubleshooting GS1510 Series User s Guide 150...
Страница 156: ...Chapter 25 Product Specifications GS1510 Series User s Guide 156...
Страница 158: ...158...
Страница 178: ...Appendix C Legal Information GS1510 Series User s Guide 178...
Страница 204: ...Index GS1510 Series User s Guide 204...