Ip Source Guard - Cisco 500 series Administration Manual

Stackable managed switch
Hide thumbs Also See for 500 series:
Table of Contents

Advertisement

Configuring Security

IP Source Guard

STEP 4
IP Source Guard
Cisco 500 Series Stackable Managed Switch Administration Guide
IP Address—Enter an IP network from which the fragmented IP packets is
filtered or select All Addresses to block IP fragmented packets from all
addresses. If you enter the IP address, enter either the mask or prefix length.
Network Mask—Select the format for the subnet mask for the source IP
address, and enter a value in one of the field:
-
Mask—Select the subnet to which the source IP address belongs and
enter the subnet mask in dotted decimal format.
-
Prefix Length—Select the Prefix Length and enter the number of bits that
comprise the source IP address prefix.
Click Apply. The IP fragmentation is defined, and the Running Configuration file is
updated.
IP Source Guard is a security feature that can be used to prevent traffic attacks
caused when a host tries to use the IP address of its neighbor.
When IP Source Guard is enabled, the switch only transmits client IP traffic to IP
addresses contained in the DHCP Snooping Binding database. This includes both
addresses added by DHCP Snooping and manually-added entries.
If the packet matches an entry in the database, the switch forwards it. If not, it is
dropped.
Interactions with Other Features
The following points are relevant to IP Source Guard:
DHCP Snooping must be globally enabled in order to enable IP Source
Guard on an interface.
IP source guard can be active on an interface only if:
-
DHCP Snooping is enabled on at least one of the port's VLANs
-
The interface is DHCP untrusted. All packets on trusted ports are
forwarded.
18
337

Advertisement

Table of Contents
loading

Table of Contents