Ip source-guard – Brocade 6910 Ethernet Access Switch Configuration Guide (Supporting R2.2.0.0) User Manual
Page 278

222
Brocade 6910 Ethernet Access Switch Configuration Guide
53-1002651-02
10
IP Source Guard
Example
This example configures a static source-guard binding on port 5.
Console(config)#ip source-guard binding 11-22-33-44-55-66 vlan 1 192.168.0.99
interface ethernet 1/5
Console(config-if)#
Related Commands
ip source-guard
This command configures the switch to filter inbound traffic based source IP address, or source IP
address and corresponding MAC address. Use the no form to disable this function.
Syntax
ip source-guard {sip | sip-mac}
no ip source-guard
sip - Filters traffic based on IP addresses stored in the binding table.
sip-mac - Filters traffic based on IP addresses and corresponding MAC addresses stored in
the binding table.
Default Setting
Disabled
Command Mode
Interface Configuration (Ethernet)
Command Usage
•
Source guard is used to filter traffic on an insecure port which receives messages from outside
the network or fire wall, and therefore may be subject to traffic attacks caused by a host trying
to use the IP address of a neighbor.
•
Setting source guard mode to “sip” or “sip-mac” enables this function on the selected port.
Use the “sip” option to check the VLAN ID, source IP address, and port number against all
entries in the binding table. Use the “sip-mac” option to check these same parameters, plus
the source MAC address. Use the no ip source guard command to disable this function on the
selected port.
•
When enabled, traffic is filtered based upon dynamic entries learned via DHCP snooping, or
static addresses configured in the source guard binding table.
•
Table entries include a MAC address, IP address, lease time, entry type (Static-IP-SG-Binding,
Dynamic-DHCP-Binding, VLAN identifier, and port identifier.
•
Static addresses entered in the source guard binding table with the
command (see
on page 221) are automatically configured with an
infinite lease time. Dynamic entries learned via DHCP snooping are configured by the DHCP
server itself.