27-3
Cisco IE 2000 Switch Software Configuration Guide
OL-25866-01
Chapter 27 Configuring IP Source Guard
Information About IP Source Guard
IPSG for static hosts also supports dynamic hosts. If a dynamic hos t receives a DHCP-assigned IP
address that is available in the IP DHCP snooping table, the same entry is learned by the IP device
tracking table. When you enter the show ip device tracking all EXEC command, the IP device tracking
table displays the entries as ACTIVE.
Note Some IP hosts with multiple network interfaces can inject some invalid packets into a network
interface. The invalid packets contain the IP or MAC address for another network interface of
the host as the source address. The invalid packets can cause IPSG for static hosts to connect to
the host, to learn the invalid IP or MAC address bindings, and to reject the valid bindings.
Consult the vendor of the corresponding operating system and the network inte rface to prevent
the host from injecting invalid packets.
IPSG for static hosts initially learns IP or MAC bindings dynamically through an ACL-based snooping
mechanism. IP or MAC bindings are learned from static hosts by ARP and IP pa ckets. They are stored
in the device tracking database. When the number of IP addre sses that have been dynamically learned or
statically configured on a given port reaches a maximum, the hardware drops any packet with a new IP
address. To resolve hosts that have moved or gone away for any reason, IPSG for static hosts leverages
IP device tracking to age out dynamically learned IP address bindings. This feature can be used with
DHCP snooping. Multiple bindings are established on a port that is connected to both DHCP and static
hosts. For example, bindings are stored in both the device tracking database as well as in the DHCP
snooping binding database.
IP Source Guard Configuration Guidelines
By default, IP source guard is disabled.
You can configure static IP bindings only on nonrouted ports. If you enter the ip source binding
mac-address vlan vlan-id ip-address interface interface-id global configuration command on a
routed interface, this error message appears:
Static IP source binding can only be configured on switch port.
When IP source guard with source IP filtering is enabled on an interface, DHCP snooping must be
enabled on the access VLAN for that interface.
If you are enabling IP source guard on a trunk interface with m ultiple VLANs and DHCP snooping
is enabled on all the VLANs, the source IP address filter is applied on all the VLANs.
Note If IP source guard is enabled and you enable or disable DHCP snooping on a VLAN on the
trunk interface, the switch might not properly filter traffic.
If you enable IP source guard with source IP and MAC address filtering, DHCP snooping and port
security must be enabled on the interface. You must also enter the ip dhcp snooping information
option global configuration command and ensure that the DHCP server supports option 82. When
IP source guard is enabled with MAC address filtering, the DHCP host MAC address is not lea rned
until the host is granted a lease. When forwarding packets from the server to the host, DHCP
snooping uses option-82 data to identify the host port.
When configuring IP source guard on interfaces on which a private VLAN is configured, port
security is not supported.
IP source guard is not supported on EtherChannels.