IP source guard overview
IP Source Guard is a filter that operates on a per interface basis.
IP traffic is permitted only if the IP address and MAC address of each packet match an entry from either the DHCP snooping binding table or a static IP source entry.
-
Entries in the Dynamic Host Configuration Protocol (DHCP) snooping binding table
-
Static IP source entries that you configure
Filtering on trusted IP and MAC address bindings helps prevent spoofing attacks. In a spoofing attack, an attacker uses the IP address of a valid host to gain unauthorized network access. To circumvent IP Source Guard, an attacker would have to spoof both the IP address and the MAC address of a valid host.
IP source guard architecture
You can enable IP Source Guard on Layer 2 interfaces that are not trusted by DHCP snooping. It supports interfaces operating in access mode and trunk mode. When you first enable IP Source Guard, the interface blocks all inbound IP traffic except:
-
DHCP packets that DHCP snooping inspects and then forwards or drops, depending on the results of the inspection
-
IP traffic from static IP source entries you have configured on the NX-OS device.
The device permits IP traffic when DHCP snooping adds a binding table entry for the IP address and MAC address of a packet, or when a static IP source entry has been configured.
The device drops IP packets when neither the IP address nor the MAC address have a binding table entry or a static IP source entry.
For example, assume that the show ip dhcp snooping binding command displays this binding table entry:
MacAddress IpAddress LeaseSec Type VLAN Interface
----------------- ---------- --------- ------------- ---- ---------
00:02:B3:3F:3B:99 10.5.5.2 6943 dhcp-snooping 10 Ethernet2/3
If the device receives an IP packet with an IP address of 10.5.5.2, IP Source Guard forwards the packet only if the MAC address of the packet is 00:02:B3:3F:3B:99.

Feedback