ZyXEL GS1510-24 User Guide - Page 103

IP Source Guard

Page 103 highlights

CHAPTER 18 IP Source Guard 18.1 Overview Use the IP source guard screens to filter unauthorized DHCP and ARP packets in your network. IP source guard uses a binding table to distinguish between the authorized and unauthorized DHCP and ARP packets in your network. 18.2 What You Can Do • Use the DHCP Snooping screens (Section 18.4 on page 107) to filter unauthorized DHCP packets on the network and to build the binding table dynamically. • Use the ARP Inspection screens (Section 18.6 on page 110) to filter unauthorized ARP packets on the network. • Use the Binding Table screens (Section 18.7 on page 112) to manually enter static bindings and to convert dynamic bindings to static. 18.3 What You Need To Know A binding in the IP source guard binding table contains these key attributes: • MAC address • VLAN ID • IP address • Port number When the Switch receives an ARP packet, it looks up the appropriate MAC address, VLAN ID, IP address, and port number in the binding table. If there is a binding, the Switch forwards the packet. If there is not a binding, the Switch discards the packet. The Switch builds the binding table by snooping DHCP packets (dynamic bindings) and from information provided manually by administrators (static bindings). GS1510 Series User's Guide 103

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204

GS1510 Series User’s Guide
103
C
HAPTER
18
IP Source Guard
18.1
Overview
Use the IP source guard screens to filter unauthorized DHCP and ARP packets in
your network. IP source guard uses a binding table to distinguish between the
authorized and unauthorized DHCP and ARP packets in your network.
18.2
What You Can Do
Use the
DHCP Snooping
screens (
Section 18.4 on page 107
) to filter
unauthorized DHCP packets on the network and to build the binding table
dynamically.
Use the
ARP Inspection
screens (
Section 18.6 on page 110
) to filter
unauthorized ARP packets on the network.
Use the
Binding Table
screens (
Section 18.7 on page 112
) to manually enter
static bindings and to convert dynamic bindings to static.
18.3
What You Need To Know
A binding in the IP source guard binding table contains these key attributes:
MAC address
VLAN ID
IP address
Port number
When the Switch receives an ARP packet, it looks up the appropriate MAC address,
VLAN ID, IP address, and port number in the binding table. If there is a binding,
the Switch forwards the packet. If there is not a binding, the Switch discards the
packet.
The Switch builds the binding table by snooping DHCP packets (dynamic bindings)
and from information provided manually by administrators (static bindings).