IPSG based on a static binding table filters IP packets received by untrusted interfaces. This prevents malicious hosts from stealing the IP addresses of authorized hosts to access the network without permission. This function is applicable to a LAN where only a small number of hosts reside and the hosts use static IP addresses.
Perform the following operations on the switch to which users connect.
Static binding entries include IPv4 and IPv6 entries. Choose one type of entries according to your network type.
If the hosts on the network use static IP addresses, you do not need to configure trusted interfaces. However, if the upstream interface on the switch belongs to an IPSG-enabled VLAN, configure this interface as a trusted interface; otherwise, the return packets are discarded because they do not match the binding entries and service interruptions will occur. For details about how to troubleshoot this issue, see Services Are Abnormal Because the Upstream Interface Is Not Configured as a Trusted Interface. After the upstream interface is configured as a trusted interface, the switch forwards the packets received by the interface without checking them against the binding entries.
Enabling IPSG on an interface: IPSG checks all packets received by the interface against the binding entry. Choose this method if you need to check IP packets on the specified interfaces and trust other interfaces. This method is ideal if an interface belongs to multiple VLANs because you do not need to enable IPSG in each VLAN.
Enabling IPSG in a VLAN: IPSG checks the packets received by all interfaces in the VLAN against the binding entry. Choose this method if you need to check IP packets in the specified VLANs and trust other VLANs. This method is ideal if multiple interfaces belong to the same VLAN because you do not need to enable IPSG on each interface.
By default, IP packet check is disabled on interfaces or in VLANs.
This step is valid only when IPSG is enabled on an interface in Step 3. After this alarm function is configured, the switch generates an alarm if the number of discarded IP packets exceeds the threshold.
Run the system-view command to enter the system view.
Run the interface interface-type interface-number command to enter the interface view.
Run the ip source check user-bind alarm enable command to enable the IP packet check alarm.
By default, IP packet check alarm is disabled.
Run the ip source check user-bind alarm threshold threshold command to set the IP packet check alarm threshold.
By default, the IP packet check alarm threshold is 100.
View the IPSG configuration on an interface.
Run the display ip source check user-bind interface interface-type interface-number command to check the IPSG configuration on the interface.
View the static binding entries and status.
Run the display dhcp static user-bind { { interface interface-type interface-number | ip-address ip-address | mac-address mac-address | vlan vlan-id } * | all } [ verbose ] command to view IPv4 static binding entries.
Run the display dhcpv6 static user-bind { { interface interface-type interface-number | ipv6-address { ipv6-address | all } | mac-address mac-address | vlan vlan-id } * | all } [ verbose ] command to view IPv6 static binding entries.