ZyXEL GS1920 Series User Guide - Page 200

What You Can

Page 200 highlights

CHAPTER 25 IP Source Guard 25.1 Overview Use IP source guard to filter unauthorized DHCP and ARP packets in your network. IP source guard uses a binding table to distinguish between authorized and unauthorized DHCP and ARP packets in your network. A binding contains these key attributes: • MAC address • VLAN ID • IP address • Port number When the Switch receives a DHCP or ARP packet, it looks up the appropriate MAC address, VLAN ID, IP address, and port number in the binding table. If there is a binding, the Switch forwards the packet. If there is not a binding, the Switch discards the packet. 25.1.1 What You Can Do • Use the IP Source Guard screen (Section 25.2 on page 201) to look at the current bindings for DHCP snooping and ARP inspection. • Use the IP Source Guard Static Binding screen (Section 25.3 on page 202) to manage static bindings for DHCP snooping and ARP inspection. • Use the DHCP Snooping screen (Section 25.4 on page 203) to look at various statistics about the DHCP snooping database. • Use this DHCP Snooping Configure screen (Section 25.5 on page 206) to enable DHCP snooping on the Switch (not on specific VLAN), specify the VLAN where the default DHCP server is located, and configure the DHCP snooping database. • Use the DHCP Snooping Port Configure screen (Section 25.5.1 on page 208) to specify whether ports are trusted or untrusted ports for DHCP snooping. • Use the DHCP VLAN Configure screen (Section 25.5.2 on page 210) to enable DHCP snooping on each VLAN and to specify whether or not the Switch adds DHCP relay agent option 82 information to DHCP requests that the Switch relays to a DHCP server for each VLAN. • Use the DHCP Snooping VLAN Port Configure screen (Section 25.5.3 on page 210) to apply a different DHCP option 82 profile to certain ports in a VLAN. • Use the ARP Inspection Status screen (Section 25.6 on page 212) to look at the current list of MAC address filters that were created because the Switch identified an unauthorized ARP packet. • Use the ARP Inspection VLAN Status screen (Section 25.7 on page 213) to look at various statistics about ARP packets in each VLAN. • Use the ARP Inspection Log Status screen (Section 25.8 on page 213) to look at log messages that were generated by ARP packets and that have not been sent to the syslog server yet. GS1920 Series User's Guide 200

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381

GS1920 Series User’s Guide
200
C
HAPTER
25
IP Source Guard
25.1
Overview
Use IP source guard to filter unauthorized DHCP and ARP packets in your network.
IP source guard uses a binding table to distinguish between authorized and unauthorized DHCP and
ARP packets in your network. A binding contains these key attributes:
MAC address
VLAN ID
IP address
Port number
When the Switch receives a DHCP or ARP packet, it looks up the appropriate MAC address, VLAN ID,
IP address, and port number in the binding table. If there is a binding, the Switch forwards the
packet. If there is not a binding, the Switch discards the packet.
25.1.1
What You Can Do
Use the
IP Source Guard
screen (Section 25.2 on page 201) to look at the current bindings for
DHCP snooping and ARP inspection.
Use the
IP Source Guard Static Binding
screen (Section 25.3 on page 202) to manage static
bindings for DHCP snooping and ARP inspection.
Use the
DHCP Snooping
screen (Section 25.4 on page 203) to look at various statistics about
the DHCP snooping database.
Use this
DHCP Snooping Configure
screen (Section 25.5 on page 206) to enable DHCP
snooping on the Switch (not on specific VLAN), specify the VLAN where the default DHCP server
is located, and configure the DHCP snooping database.
Use the
DHCP Snooping Port Configure
screen (Section 25.5.1 on page 208) to specify
whether ports are trusted or untrusted ports for DHCP snooping.
Use the
DHCP VLAN Configure
screen (Section 25.5.2 on page 210) to enable DHCP snooping
on each VLAN and to specify whether or not the Switch adds DHCP relay agent option 82
information to DHCP requests that the Switch relays to a DHCP server for each VLAN.
Use the
DHCP Snooping VLAN Port Configure
screen (Section 25.5.3 on page 210) to apply a
different DHCP option 82 profile to certain ports in a VLAN.
Use the
ARP Inspection Status
screen (Section 25.6 on page 212) to look at the current list of
MAC address filters that were created because the Switch identified an unauthorized ARP packet.
Use the
ARP Inspection VLAN Status
screen (Section 25.7 on page 213) to look at various
statistics about ARP packets in each VLAN.
Use the
ARP Inspection Log Status
screen (Section 25.8 on page 213) to look at log messages
that were generated by ARP packets and that have not been sent to the syslog server yet.