Chapter 20
Configuring DHCP Features and IP Source Guard
•
•
•
•
•
•
•
Enabling IP Source Guard
Beginning in privileged EXEC mode, follow these steps to enable and configure IP source guard on an
interface.
Command
Step 1
configure terminal
Step 2
interface interface-id
Step 3
ip verify source
or
ip verify source port-security
Step 4
exit
Step 5
ip source binding mac-address vlan
vlan-id ip-address inteface interface-id
Step 6
end
OL-8915-03
When IP source guard with source IP filtering is enabled on a VLAN, DHCP snooping must be
enabled on the access VLAN to which the interface belongs.
If you are enabling IP source guard on a trunk interface with multiple VLANs and DHCP snooping
is enabled on all the VLANs, the source IP address filter is applied on all the VLANs.
If IP source guard is enabled and you enable or disable DHCP snooping on a VLAN on the
Note
trunk interface, the switch might not properly filter traffic.
When IP source guard with source IP and MAC address filtering is enabled, DHCP snooping and
port security must be enabled on the interface.
When configuring IP source guard on interfaces on which a private VLAN is configured, port
security is not supported.
IP source guard is not supported on EtherChannels.
You can enable this feature when IEEE 802.1x port-based authentication is enabled.
If the number of ternary content addressable memory (TCAM) entries exceeds the maximum
available, the CPU usage increases.
Purpose
Enter global configuration mode.
Specify the interface to be configured, and enter interface configuration
mode.
Enable IP source guard with source IP address filtering.
Enable IP source guard with source IP and MAC address filtering.
Note
Return to global configuration mode.
Add a static IP source binding.
Enter this command for each static binding.
Return to privileged EXEC mode.
When you enable both IP Source Guard and Port Security by
using the ip verify source port-security interface configuration
command, there are two caveats:
The DHCP server must support option 82, or the client is not
•
assigned an IP address.
The MAC address in the DHCP packet is not learned as a secure
•
address. The MAC address of the DHCP client is learned as a
secure address only when the switch receives non-DHCP data
traffic.
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
Configuring IP Source Guard
20-17