1. Basic Concepts of IPSG IPSG is the abbreviation of IP Source Guard. IPSG can prevent attacks that spoof the source IP address. As the scale of the network grows, attacks based on source IP are also increasing. Some attackers use deception to obtain network resources and obtain the right to use network resources legally, and even cause the deceived to be unable to access the network or information leakage. IPSG provides a defense mechanism for attacks based on source IP, which can effectively prevent network attacks based on source address deception. The IPSG function is to match and check the IP message based on the binding table (DHCP dynamic and static binding table). When the device is forwarding an IP message, it compares the source IP, source MAC (Media Access Control), interface, VLAN (Virtual Local Area Network) information in the IP message with the information in the binding table. If the information matches, indicating that it is a legitimate user, the message is allowed to be forwarded normally. Otherwise, it is considered to be an attack message and the IP message is discarded. 2. Deployment Scenario Generally deployed on access switches close to users (can also be on aggregation or core switches), it can prevent attacks that spoof source IP addresses, such as illegal hosts impersonating legitimate hosts' IP addresses to gain Internet access or attack the network. The main application scenarios are as follows: Scenario 1: Prevent the host from changing its IP address privately through IPSG. The host can only use the IP address assigned by the DHCP server or the static address configured by the administrator. If the IP address is changed at will, the host cannot access the network, preventing the host from illegally obtaining Internet access rights. The static IP address configured for the printer is only used by the printer, preventing the host from accessing the network by spoofing the printer's IP address. Scenario 2: Limit illegal host access through IPSG (for environments where IP addresses are statically assigned) Fixed hosts can only access from fixed interfaces and cannot change their access locations at will, thus meeting the purpose of interface-based speed limiting. Outsiders cannot access the intranet with their own computers at will to prevent leakage of intranet resources. For environments where IP addresses are dynamically assigned by DHCP, limiting illegal host access is generally achieved through NAC authentication (such as Portal authentication or 802.1x authentication, etc.). 3. Network topology 1. Idea The configuration roadmap is as follows:
II. Configuration procedure (1) Configuring the IP packet inspection function
(2) Configuring a static binding entry [Switch] user-bind static ip-address 10.0.0.1 mac-address 0001-0001-0001 interface gigabitethernet 0/0/1 vlan 10 //Configure HostA as a static binding entry. (3) Verification results Run the display dhcp static user-bind all command on the Switch to view the binding table information. |
<<: 5G Downlink Channel Sounding "CSI-RS"
>>: 5G indoor coverage poses problems for office buildings and operators
The hottest word in the technology field in 2016 ...
The Linkerd 2.10 Chinese manual is being continuo...
[Original article from 51CTO.com] According to Bl...
Memory security is not a new concept, but the sur...
Evaluate your current Wi-Fi network Before gettin...
Hello everyone, I am Xiaozaojun. The joyful and ...
[[428617]] North American 5G connections grew 67%...
LocVps is a long-established Chinese hosting comp...
Starring in the story: Xiaohua is a freshman this...
spinservers has just released this month's pr...
US-based telecom operators have been working on h...
Preface I have recently become interested in 5G n...
All modern industrial equipment uses long cables ...
iWebFusion is the iWFHosting that the tribe has s...
On June 6, Robin Marx, a member of the IETF QUIC ...