D-Link DGS-6600-48TS Configuration Guide - Page 473

IP Source Guard Configuration Commands, ip verify source vlan dhcp-snooping port-security

Page 473 highlights

Volume 8-Security & Authentication / Chapter 46-IP Source Guard IP Source Guard Configuration Commands has no enough slice to create deny or permit entry, then the static entry will not be set in IP Source Guard database and this entry should be as inactive. The Switch needs to log and prompt warning message under this situation. The maximum entry of IP Source Guard is 512 include a deny rule. When the active entries are less than max entry, but total number of active and inactive entries is exceeds double max entry, IP source Guard will delete the inactive entry first build, and build new active entry. IP source guard only displays the active entries. IP source guard has two modes to filter (IP, MAC VLAN, Port), IP filter and IP-MAC filter. In IP filter mode, IP source guard will add an ACL permit rule as (IP, Port). In IP-MAC filter mode, IP source guard will add an ACL permit rule as (IP, MAC, Port). If user configures filter mode as IP filter and configure IP-MAC filter mode next time, then the filter mode of port will be change as the latest filter mode that user configure. While IP packet is unauthorized by IP source guard, this invalid IP packet will not records in any blocked or invalid table and L2 FDB will not has any blocked entry. Because IP source guard is not support IPv6 in Release2, while user runs IP source guard then the FDB table will be configured by software. But the IPv6 packets not support so the MAC address will not be configured in FDB table. IPv6 and IPv4 must not configure on same VLAN while IP source guard enable in Release2. IP Source Guard Configuration Commands ip verify source vlan dhcp-snooping port-security Command ip verify source vlan dhcp-snooping port-security no ip verify source vlan dhcp-snooping port-security Explanation Use this command to enable IP source guard for a port. Use the no form of the command to disable IP source guard. Use the command the enable the IP source guard on the configured port. When a port is enabled for IP source guard, the IP packet arrives at the port will be validated via port ACL. Port ACL is a hardware mechanism and its entry can come from either the manual configured entry or the DHCP snooping binding database. The packet fails to pass the validation will be dropped. The IP to MAC address binding pair must match the entries in port ACL to pass the validation. Example This example shows how to enable IP Source Guard for port 3.1: DGS-6600# configure terminal DGS-6600(config)# interface eth3.1 DGS-6600(config-if)# ip verify source vlan dhcp-snooping port security DGS-6600(config-if)# DGS-6600 Configuration Guide 473

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442
  • 443
  • 444
  • 445
  • 446
  • 447
  • 448
  • 449
  • 450
  • 451
  • 452
  • 453
  • 454
  • 455
  • 456
  • 457
  • 458
  • 459
  • 460
  • 461
  • 462
  • 463
  • 464
  • 465
  • 466
  • 467
  • 468
  • 469
  • 470
  • 471
  • 472
  • 473
  • 474
  • 475
  • 476
  • 477
  • 478
  • 479
  • 480
  • 481
  • 482
  • 483
  • 484
  • 485
  • 486
  • 487
  • 488
  • 489
  • 490
  • 491
  • 492
  • 493
  • 494
  • 495
  • 496
  • 497
  • 498
  • 499
  • 500
  • 501
  • 502
  • 503
  • 504
  • 505
  • 506
  • 507
  • 508
  • 509
  • 510
  • 511
  • 512
  • 513
  • 514
  • 515
  • 516
  • 517
  • 518
  • 519
  • 520
  • 521
  • 522
  • 523
  • 524
  • 525
  • 526
  • 527
  • 528
  • 529
  • 530
  • 531
  • 532
  • 533
  • 534
  • 535
  • 536
  • 537
  • 538
  • 539
  • 540
  • 541
  • 542
  • 543
  • 544
  • 545
  • 546
  • 547
  • 548
  • 549
  • 550
  • 551
  • 552
  • 553
  • 554
  • 555
  • 556
  • 557
  • 558
  • 559
  • 560
  • 561
  • 562
  • 563
  • 564
  • 565
  • 566
  • 567
  • 568
  • 569
  • 570
  • 571
  • 572
  • 573
  • 574
  • 575
  • 576
  • 577
  • 578
  • 579
  • 580
  • 581
  • 582
  • 583
  • 584
  • 585
  • 586
  • 587
  • 588
  • 589
  • 590
  • 591
  • 592
  • 593
  • 594
  • 595
  • 596
  • 597
  • 598
  • 599
  • 600
  • 601
  • 602
  • 603

Volume 8-Security & Authentication / Chapter 46-IP Source Guard
IP Source Guard Configuration Commands
DGS-6600 Configuration Guide
473
has no enough slice to create deny or permit entry, then the static entry will not be set in IP Source
Guard database and this entry should be as inactive. The Switch needs to log and prompt warning
message under this situation.
The maximum entry of IP Source Guard is 512 include a deny rule. When the active entries are less
than max entry, but total number of active and inactive entries is exceeds double max entry, IP
source Guard will delete the inactive entry first build, and build new active entry. IP source guard
only displays the active entries.
IP source guard has two modes to filter (IP, MAC VLAN, Port), IP filter and IP-MAC filter. In IP filter
mode, IP source guard will add an ACL permit rule as (IP, Port). In IP-MAC filter mode, IP source
guard will add an ACL permit rule as (IP, MAC, Port). If user configures filter mode as IP filter and
configure IP-MAC filter mode next time, then the filter mode of port will be change as the latest filter
mode that user configure.
While IP packet is unauthorized by IP source guard, this invalid IP packet will not records in any
blocked or invalid table and L2 FDB will not has any blocked entry.
Because IP source guard is not support IPv6 in Release2, while user runs IP source guard then the
FDB table will be configured by software. But the IPv6 packets not support so the MAC address will
not be configured in FDB table. IPv6 and IPv4 must not configure on same VLAN while IP source
guard enable in Release2.
IP Source Guard Configuration Commands
ip verify source vlan dhcp-snooping port-security
Use the command the enable the IP source guard on the configured port.
When a port is enabled for IP source guard, the IP packet arrives at the port will be validated via port
ACL. Port ACL is a hardware mechanism and its entry can come from either the manual configured
entry or the DHCP snooping binding database. The packet fails to pass the validation will be
dropped.
The IP to MAC address binding pair must match the entries in port ACL to pass the validation.
Example
This example shows how to enable IP Source Guard for port 3.1:
Command
Explanation
ip verify source vlan dhcp-snooping port-security
no ip verify source vlan dhcp-snooping port-security
Use this command to enable IP source guard for a
port. Use the no form of the command to disable IP
source guard.
DGS-6600# configure terminal
DGS-6600(config)# interface eth3.1
DGS-6600(config-if)# ip verify source vlan dhcp-snooping port security
DGS-6600(config-if)#