CLI Reference Guide-R04

Table Of Contents
Chapter 9
| General Security Measures
IPv4 Source Guard
– 354 –
the sip-mac option). If a matching entry is found in the binding table and
the entry type is static IP source guard binding, the packet will be
forwarded.
If the DHCP snooping is enabled, IP source guard will check the VLAN ID,
source IP address, port number, and source MAC address (for the sip-mac
option). If a matching entry is found in the binding table and the entry type
is static IP source guard binding, or dynamic DHCP snooping binding, the
packet will be forwarded.
If IP source guard is enabled on an interface for which IP source bindings
(dynamically learned via DHCP snooping or manually configured) are not
yet configured, the switch will drop all IP traffic on that port, except for
DHCP packets allowed by DHCP snooping.
Only unicast addresses are accepted for static bindings.
Example
This example enables IP source guard on port 5.
Console(config)#interface ethernet 1/5
Console(config-if)#ip source-guard sip
Console(config-if)#
Related Commands
ip source-guard binding (351)
ip dhcp snooping (325)
ip dhcp snooping vlan (333)
ip source-guard
max-binding
This command sets the maximum number of entries that can be bound to an
interface. Use the no form to restore the default setting.
Syntax
ip source-guard [mode {acl | mac}] max-binding number
no ip source-guard [mode {acl | mac}] max-binding
mode - Specifies the learning mode.
acl - Searches for addresses in the ACL table.
mac - Searches for addresses in the MAC address table.
number - The maximum number of IP addresses that can be mapped to an
interface in the binding table. (Range: 1-10 for ACL mode; 1-1024 for MAC
mode)
Default Setting
Mode: ACL
Maximum Binding: 5