Cisco WS-CE500-24TT Administration Guide - Page 128

Configuring IP/MAC Binding to Prevent Spoofing, > MAC Filtering > IP/MAC Binding

Page 128 highlights

Firewall Configuration Using Other Tools to Control Access to the Internet 4 Configuring IP/MAC Binding to Prevent Spoofing You can use IP/MAC binding to allow traffic from the LAN to the WAN only when the host has an IP address that matches a specified MAC address. By requiring the gateway to validate the source traffic's IP address with the unique MAC address of device, the administrator can ensure that traffic from the specified IP address is not spoofed. In the event of a violation (the traffic's source IP address doesn't match up with the expected MAC address having the same IP address), the packets will be dropped and can be logged for diagnosis. STEP 1 Click Firewall > MAC Filtering > IP/MAC Binding. The IP/MAC Binding window opens. STEP 2 To add an IP/MAC binding to the table, click Add. Other options: Click the Edit button to edit an entry. To delete an entry, check the box and then click Delete. To select all entries, check the box in the first column of the table heading. After you click Add or Edit, the IP MAC Binding Configuration window opens. STEP 3 Enter the following information: • Name: Enter a name for this IP/MAC binding. • MAC Address: Enter the MAC address. • IP Address: Enter the IP address. • Log Dropped Packets: Choose Enable to keep a log of all packets that are dropped as a result of this security feature. Otherwise, choose Disable. NOTE After you enable the logging, you can view these logs by clicking Status on the menu bar, and then clicking View Log > View All Logs. STEP 4 Click Apply to save your settings. Cisco SA500 Series Security Appliances Administration Guide 128

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240

Firewall Configuration
Using Other Tools to Control Access to the Internet
Cisco SA500 Series Security Appliances Administration Guide
128
4
Configuring IP/MAC Binding to Prevent Spoofing
You can use IP/MAC binding to allow traffic from the LAN to the WAN only when
the host has an IP address that matches a specified MAC address. By requiring the
gateway to validate the source traffic’s IP address with the unique MAC address of
device, the administrator can ensure that traffic from the specified IP address is
not spoofed. In the event of a violation (the traffic’s source IP address doesn’t
match up with the expected MAC address having the same IP address), the
packets will be dropped and can be logged for diagnosis.
STEP 1
Click
Firewall
> MAC Filtering > IP/MAC Binding
.
The IP/MAC Binding window opens.
STEP 2
To add an IP/MAC binding to the table, click
Add
.
Other options:
Click the
Edit
button to edit an entry. To delete an entry, check the
box and then click
Delete
. To select all entries, check the box in the first column of
the table heading.
After you click Add or Edit, the IP MAC Binding Configuration window opens.
STEP 3
Enter the following information:
Name:
Enter a name for this IP/MAC binding.
MAC Address:
Enter the MAC address.
IP Address:
Enter the IP address.
Log Dropped Packets:
Choose
Enable
to keep a log of all packets that are
dropped as a result of this security feature. Otherwise, choose
Disable
.
NOTE
After you enable the logging, you can view these logs by clicking
Status
on the menu bar, and then clicking
View Log > View All Logs
.
STEP
4
Click
Apply
to save your settings.