HP 6125G HP 6125G & 6125G/XG Blade Switches Security Configuration Gui - Page 235

Configuring IP source guard, Overview, Static IP source guard entries, Dynamic IP source guard

Page 235 highlights

Configuring IP source guard Overview IP source guard is intended to improve port security by blocking illegal packets. For example, it can prevent illegal hosts from using a legal IP address to access the network. IP source guard can filter packets according to the packet source IP address and source MAC address. IP source guard entries fall into the following types: • IP-port binding entry • MAC-port binding entry • IP-MAC-port binding entry After receiving a packet, an IP source guard-enabled port obtains the key attributes (source IP address and source MAC address) of the packet and then looks them up in the IP source guard entries. If there is a match, the port forwards the packet. Otherwise, the port discards the packet, as shown in Figure 68. Figure 68 Diagram for the IP source guard function A binding entry can be statically configured or dynamically added. Static IP source guard entries A static IP source guard entry is configured manually. A port forwards a packet only when the source IP address and source MAC address of the packet exactly match an IP source guard entry on the port. IP source guard entries are suited to check the validity of access users, especially in LAN that has only a few hosts and the hosts use statically configured IP addresses. For example, you can configure an IP source guard entry on a port connecting a server, permitting only the packets exchanged with the server to pass the port. A static IPv4 source guard entry filters IPv4 packets received by the port or cooperates with ARP detection to check the validity of users. For information about ARP detection, see "Configuring ARP attack protection. Dynamic IP source guard entries Dynamic IP source guard entries are generated dynamically according to client entries on the DHCP snooping or DHCP relay agent device. They are suitable for scenarios where many hosts reside on a LAN 225

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285

225
Configuring IP source guard
Overview
IP source guard is intended to improve port security by blocking illegal packets. For example, it can
prevent illegal hosts from using a legal IP address to access the network.
IP source guard can filter packets according to the packet source IP address and source MAC address.
IP source guard entries fall into the following types:
IP-port binding entry
MAC-port binding entry
IP-MAC-port binding entry
After receiving a packet, an IP source guard-enabled port obtains the key attributes (source IP address
and source MAC address) of the packet and then looks them up in the IP source guard entries. If there is
a match, the port forwards the packet. Otherwise, the port discards the packet, as shown in
Figure 68
.
Figure 68
Diagram for the IP source guard function
A binding entry can be statically configured or dynamically added.
Static IP source guard entries
A static IP source guard entry is configured manually. A port forwards a packet only when the source IP
address and source MAC address of the packet exactly match an IP source guard entry on the port. IP
source guard entries are suited to check the validity of access users, especially in LAN that has only a few
hosts and the hosts use statically configured IP addresses. For example, you can configure an IP source
guard entry on a port connecting a server, permitting only the packets exchanged with the server to pass
the port.
A static IPv4 source guard entry filters IPv4 packets received by the port or cooperates with ARP detection
to check the validity of users.
For information about ARP detection, see "
Configuring ARP attack protection
.
Dynamic IP source guard entries
Dynamic IP source guard entries are generated dynamically according to client entries on the DHCP
snooping or DHCP relay agent device. They are suitable for scenarios where many hosts reside on a LAN