D-Link DGS-6600-48TS Configuration Guide - Page 472

IP Source Guard, Overview, An Introduction to IP Source Guard

Page 472 highlights

Volume 8-Security & Authentication / Chapter 46-IP Source Guard Chapter Overview Chapter 46 IP Source Guard Chapter Overview The following topics are included in this chapter, please go to the topic for more detailed information: • Chapter Overview • An Introduction to IP Source Guard • IP Source Guard Configuration Commands • ip verify source vlan dhcp-snooping port-security • ip source binding An Introduction to IP Source Guard IP Source Guard is a security application used on edge switches are usually directly connected to hosts. IP Source Guard provides administrators to configure pairs of MAC and IP addresses that are allowed to access networks through the switch. IP Source Guard binds together the network layer, which uses an IP address, and the Ethernet link layer, which uses a MAC address, to authenticate packets from host. The feature uses dynamic DHCP snooping and static IP source binding to match IP addresses to hosts on untrusted Layer 2 access ports. In IP Source Guard, all IP packets will be drop by default ACL rule if enable IP Source Guard. While user enables IP Source Guard will use ACL rules to authorize IP packet. After a client receives an IP address from the DHCP server, or after static IP source binding is configured by the administrator, all traffic with that IP source address is permitted from that client. Traffic from other hosts is denied. All L2 packets will be drop before IP packet with same MAC address authorized by IP source guard. The key of IP Source Guard database is MAC address and VLAN. When user configures (IP, MAC, VLAN, Port) in IP Source Guard will add a ACL permit rule. The IP packets received by switch not match the IP Source Guard database will be blocked by the ACL deny rule and the non-IP packets will be passed. If the IP Source Guard is disabled, all ACL deny and permit rules which configure by user will be removed from the hardware ACL table. Each permit and deny rule of ACL will use a double wide slice (two single wide slices) to add rules. So if ACL has no enough slices even has enough entries to enable IP source guard or config static IP source guard entry, config will be failed and prompt warning message under this situation. While user configures an IP Source guard static entry then FDB will add a dynamic entry. If user config a static FDB entry and the MAC address is conflict with IP source guard entry before this dynamic FDB entry age out, then static FDB entry will not be add and prompt message. If the dynamic FDB entry that IP source guard is age out, then static FDB entry will be add success. If user configure a static entry of IP source guard and conflict with static FDB will log and prompt error message then this configure will fail. If user config a static ARP entry confilict with the IP address of IP source guard entry, then static ARP entry will be replease the entry that IP source guard configure. If user configure a static entry of IP source guard and conflict with the IP address of static ARP will log and prompt error message then this configure will fail. If the sender of the packet is an authorized client, the packets sent from this client will be forwarded. While user configures a static entry to IP Source Guard, if the HW ACL table has no enough entry or DGS-6600 Configuration Guide 472

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442
  • 443
  • 444
  • 445
  • 446
  • 447
  • 448
  • 449
  • 450
  • 451
  • 452
  • 453
  • 454
  • 455
  • 456
  • 457
  • 458
  • 459
  • 460
  • 461
  • 462
  • 463
  • 464
  • 465
  • 466
  • 467
  • 468
  • 469
  • 470
  • 471
  • 472
  • 473
  • 474
  • 475
  • 476
  • 477
  • 478
  • 479
  • 480
  • 481
  • 482
  • 483
  • 484
  • 485
  • 486
  • 487
  • 488
  • 489
  • 490
  • 491
  • 492
  • 493
  • 494
  • 495
  • 496
  • 497
  • 498
  • 499
  • 500
  • 501
  • 502
  • 503
  • 504
  • 505
  • 506
  • 507
  • 508
  • 509
  • 510
  • 511
  • 512
  • 513
  • 514
  • 515
  • 516
  • 517
  • 518
  • 519
  • 520
  • 521
  • 522
  • 523
  • 524
  • 525
  • 526
  • 527
  • 528
  • 529
  • 530
  • 531
  • 532
  • 533
  • 534
  • 535
  • 536
  • 537
  • 538
  • 539
  • 540
  • 541
  • 542
  • 543
  • 544
  • 545
  • 546
  • 547
  • 548
  • 549
  • 550
  • 551
  • 552
  • 553
  • 554
  • 555
  • 556
  • 557
  • 558
  • 559
  • 560
  • 561
  • 562
  • 563
  • 564
  • 565
  • 566
  • 567
  • 568
  • 569
  • 570
  • 571
  • 572
  • 573
  • 574
  • 575
  • 576
  • 577
  • 578
  • 579
  • 580
  • 581
  • 582
  • 583
  • 584
  • 585
  • 586
  • 587
  • 588
  • 589
  • 590
  • 591
  • 592
  • 593
  • 594
  • 595
  • 596
  • 597
  • 598
  • 599
  • 600
  • 601
  • 602
  • 603

Volume 8-Security & Authentication / Chapter 46-IP Source Guard
Chapter Overview
DGS-6600 Configuration Guide
472
IP Source Guard
Chapter Overview
The following topics are included in this chapter, please go to the topic for more detailed information:
Chapter Overview
An Introduction to IP Source Guard
IP Source Guard Configuration Commands
ip verify source vlan dhcp-snooping port-security
ip source binding
An Introduction to IP Source Guard
IP Source Guard is a security application used on edge switches are usually directly connected to
hosts. IP Source Guard provides administrators to configure pairs of MAC and IP addresses that are
allowed to access networks through the switch. IP Source Guard binds together the network layer,
which uses an IP address, and the Ethernet link layer, which uses a MAC address, to authenticate
packets from host.
The feature uses dynamic DHCP snooping and static IP source binding to match IP addresses to
hosts on untrusted Layer 2 access ports.
In IP Source Guard, all IP packets will be drop by default ACL rule if enable IP Source Guard. While
user enables IP Source Guard will use ACL rules to authorize IP packet. After a client receives an IP
address from the DHCP server, or after static IP source binding is configured by the administrator,
all traffic with that IP source address is permitted from that client. Traffic from other hosts is denied.
All L2 packets will be drop before IP packet with same MAC address authorized by IP source guard.
The key of IP Source Guard database is MAC address and VLAN.
When user configures (IP, MAC, VLAN, Port) in IP Source Guard will add a ACL permit rule. The IP
packets received by switch not match the IP Source Guard database will be blocked by the ACL
deny rule and the non-IP packets will be passed. If the IP Source Guard is disabled, all ACL deny
and permit rules which configure by user will be removed from the hardware ACL table. Each permit
and deny rule of ACL will use a double wide slice (two single wide slices) to add rules. So if ACL has
no enough slices even has enough entries to enable IP source guard or config static IP source
guard entry, config will be failed and prompt warning message under this situation.
While user configures an IP Source guard static entry then FDB will add a dynamic entry. If user
config a static FDB entry and the MAC address is conflict with IP source guard entry before this
dynamic FDB entry age out, then static FDB entry will not be add and prompt message. If the
dynamic FDB entry that IP source guard is age out, then static FDB entry will be add success. If
user configure a static entry of IP source guard and conflict with static FDB will log and prompt error
message then this configure will fail.
If user config a static ARP entry confilict with the IP address of IP source guard entry, then static
ARP entry will be replease the entry that IP source guard configure. If user configure a static entry of
IP source guard and conflict with the IP address of static ARP will log and prompt error message
then this configure will fail.
If the sender of the packet is an authorized client, the packets sent from this client will be forwarded.
While user configures a static entry to IP Source Guard, if the HW ACL table has no enough entry or
Chapter 46