ECS4100 Series Web Management Guide-R07

Table Of Contents
Chapter 12
| Security Measures
IPv4 Source Guard
– 369 –
Figure 228: Displaying Statistics for DHCPv6 Snooping
IPv4 Source Guard
IPv4 Source Guard is a security feature that filters IP traffic on network interfaces
based on manually configured entries in the IP Source Guard table, or dynamic
entries in the DHCP Snooping table when enabled (see “DHCP Snooping” on
page 352). IP source guard can be used to prevent traffic attacks caused when a
host tries to use the IPv4 address of a neighbor to access the network. This section
describes how to configure IPv4 Source Guard.
Configuring Ports
for IPv4 Source Guard
Use the Security > IP Source Guard > General page to set the filtering type based on
source IP address, or source IP address and MAC address pairs. It also specifies
lookup within the ACL binding table or the MAC address binding table, as well as
the maximum number of allowed binding entries for the lookup tables.
IP Source Guard is used to filter traffic on an insecure port which receives messages
from outside the network or fire wall, and therefore may be subject to traffic attacks
caused by a host trying to use the IP address of a neighbor.
Command Usage
Filter Type
Setting source guard mode to SIP (Source IP) or SIP-MAC (Source IP and MAC)
enables this function on the selected port. Use the SIP option to check the
VLAN ID, source IP address, and port number against all entries in the binding
table. Use the SIP-MAC option to check these same parameters, plus the source
MAC address. If no matching entry is found, the packet is dropped.
Note:
Multicast addresses cannot be used by IP Source Guard.