Chapter 12
| Security Measures
IPv4 Source Guard
– 369 –
If a matching entry is found in the binding table and the entry type is static
IP source guard binding, or dynamic DHCP snooping binding, the packet
will be forwarded.
■
If IP source guard if enabled on an interface for which IP source bindings
have not yet been configured (neither by static configuration in the IP
source guard binding table nor dynamically learned from DHCP snooping),
the switch will drop all IP traffic on that port, except for DHCP packets.
Parameters
These parameters are displayed:
◆ Filter Type – Configures the switch to filter inbound traffic based source IP
address, or source IP address and corresponding MAC address. (Default: None)
■
Disabled – Disables IP source guard filtering on the port.
■
SIP – Enables traffic filtering based on IP addresses stored in the binding
table.
■
SIP-MAC – Enables traffic filtering based on IP addresses and
corresponding MAC addresses stored in the binding table.
◆ Filter Table – Sets the source guard learning model to search for addresses in
the ACL binding table or the MAC address binding table. (Default: ACL binding
table)
◆ Max Binding Entry – The maximum number of entries that can be bound to an
interface. (ACL Table: 1-16, default: 5; MAC Table: 1-1024, default: 1024)
This parameter sets the maximum number of address entries that can be
mapped to an interface in the binding table, including both dynamic entries
discovered by DHCP snooping (see “DHCP Snooping” on page 380) and static
entries set by IP source guard (see “Configuring Static Bindings for IPv4 Source
Guard” on page 370).
Web Interface
To set the IP Source Guard filter for ports:
1. Click Security, IP Source Guard, Port Configuration.
2. Set the required filtering type, set the table type to use ACL or MAC address
binding, and then set the maximum binding entries for each port.
3. Click Apply