Chapter 26 IP Source Guard
XS1920 Series User’s Guide
221
• Use the
ARP Inspection Log Status
screen (
) to look at log
messages that were generated by ARP packets and that have not been sent to the syslog server
yet.
• Use the
ARP Inspection Configure
screen (
) to enable ARP
inspection on the Switch. You can also configure the length of time the Switch stores records of
discarded ARP packets and global settings for the ARP inspection log.
• Use the
ARP Inspection Port Configure
screen (
) to specify
whether ports are trusted or untrusted ports for ARP inspection.
• Use the
ARP Inspection VLAN Configure
screen (
) to enable ARP
inspection on each VLAN and to specify when the Switch generates log messages for receiving
ARP packets from each VLAN.
• Use the
IPv6 Source Binding Status
screen (
) to look at the current
IPv6 dynamic and static bindings and to remove dynamic bindings based on IPv6 address and/or
IPv6 prefix.
• Use the
IPv6 Static Binding Setup
screen (
) to manually create an
IPv6 source guard binding table and manage IPv6 static bindings.
• Use the
IPv6 Source Guard Policy
Setup
) to have IPv6
source guard forward valid IPv6 addresses and/or IPv6 prefixes that are stored in the binding
table and allow or block data traffic from all link-local addresses
• Use the
IPv6 Source Guard Port Setup
) to apply
configured IPv6 source guard policies to the ports you specify.
• Use the
IPv6 Snooping Policy Setup
screen (
) to dynamically create
an IPv6 source guard binding table using a DHCPv6 snooping policy. A DHCPv6 snooping policy
lets the Switch sniff DHCPv6 packets sent from a DHCPv6 server to a DHCPv6 client when it is
assigning an IPv6 address.
• Use the
IPv6 Snooping VLAN Setup
) to enable a DHCPv6
snooping policy on a specific VLAN interface.
• Use the
IPv6 DHCP Trust Setup
screen (
) to specify which ports are
trusted and untrusted for DHCP snooping.
26.1.2 What You Need to Know
The Switch builds the binding table by snooping DHCP packets (dynamic bindings) and from
information provided manually by administrators (static bindings).
IP source guard consists of the following features:
• Static bindings. Use this to create static bindings in the binding table.
• DHCP snooping. Use this to filter unauthorized DHCP packets on the network and to build the
binding table dynamically.
• ARP inspection. Use this to filter unauthorized ARP packets on the network.
If you want to use dynamic bindings to filter unauthorized ARP packets (typical implementation),
you have to enable DHCP snooping before you enable ARP inspection.
26.2 IP Source Guard Screen
Use this screen to go to the configuration screens where you can configure IPv4 or IPv6 source
guard settings. Click
Advanced Application
>
IP Source Guard
in the navigation panel.
Содержание XS1920 Series
Страница 18: ...18 PART I User s Guide ...
Страница 32: ...32 PART II Technical Reference ...
Страница 171: ...Chapter 21 Classifier XS1920 Series User s Guide 171 Figure 119 Advanced Application Classifier Configuration ...
Страница 177: ...Chapter 21 Classifier XS1920 Series User s Guide 177 Figure 122 Classifier Example EXAMPLE ...
Страница 209: ...Chapter 24 Multicast XS1920 Series User s Guide 209 Figure 143 MVR Group Configuration Example EXAMPLE ...
Страница 383: ...Chapter 50 Configure Clone XS1920 Series User s Guide 383 Figure 273 Management Configure Clone ...
Страница 408: ...Appendix C IPv6 XS1920 Series User s Guide 408 ...
Страница 412: ...Appendix D Legal Information XS1920 Series User s Guide 412 Environmental Product Declaration ...