Cisco Systems SF300-24P Switch User Manual


 
Security
IP Source Guard
349 Cisco Small Business 300 Series Managed Switch Administration Guide
17
Interface—Select the interface on which the IP fragmentation is being
defined.
IP Address—Enter an IP network from which the fragmented IP packets is
filtered or select All Addresses to block IP fragmented packets from all
addresses. If you enter the IP address, enter either the mask or prefix length.
Network Mask—Select the format for the subnet mask for the source IP
address, and enter a value in one of the field:
- Mask—Select the subnet to which the source IP address belongs and
enter the subnet mask in dotted decimal format.
- Prefix Length—Select the Prefix Length and enter the number of bits that
comprise the source IP address prefix.
STEP 4 Click Apply. The IP fragmentation is defined, and the Running Configuration file is
updated.
IP Source Guard
IP Source Guard is a security feature that can be used to prevent traffic attacks
caused when a host tries to use the IP address of its neighbor.
When IP Source Guard is enabled, the device only transmits client IP traffic to IP
addresses contained in the DHCP Snooping Binding database. This includes both
addresses added by DHCP Snooping and manually-added entries.
If the packet matches an entry in the database, the device forwards it. If not, it is
dropped.
Interactions with Other Features
The following points are relevant to IP Source Guard:
DHCP Snooping must be globally enabled in order to enable IP Source
Guard on an interface.
IP source guard can be active on an interface only if:
- DHCP Snooping is enabled on at least one of the port's VLANs