Enabling IP Source Address Validation
IP source address validation (SAV) prevents IP spoofing by forwarding only IP packets that have been
validated against the DHCP binding table.
A spoofed IP packet is one in which the IP source address is strategically chosen to disguise the attacker.
For example, using ARP spoofing, an attacker can assume a legitimate client’s identity and receive traffic
addressed to it. Then the attacker can spoof the client’s IP address to interact with other clients.
The DHCP binding table associates addresses the DHCP servers assign with the port or the port channel
interface on which the requesting client is attached and the VLAN the client belongs to. When you enable
IP source address validation on a port, the system verifies that the source IP address is one that is
associated with the incoming port and optionally that the client belongs to the permissible VLAN. If an
attacker is impostering as a legitimate client, the source address appears on the wrong ingress port and
the system drops the packet. If the IP address is fake, the address is not on the list of permissible
addresses for the port and the packet is dropped. Similarly, if the IP address does not belong to the
permissible VLAN, the packet is dropped.
To enable IP source address validation, use the following command.
NOTE: If you enable IP source guard using the
ip dhcp source-address-validation
command and if there are more entries in the current DHCP snooping binding table than the
available CAM space, SAV may not be applied to all entries. To ensure that SAV is applied correctly
to all entries, enable the
ip dhcp source-address-validation
command before adding
entries to the binding table.
• Enable IP source address validation.
INTERFACE mode
ip dhcp source-address-validation
• Enable IP source address validation with VLAN option.
INTERFACE mode
ip dhcp source-address-validation vlan
vlan-id
NOTE:
Before enabling SAV With VLAN option, allocate at least one FP block to the ipmacacl CAM
region.
DHCP MAC Source Address Validation
DHCP MAC source address validation (SAV) validates a DHCP packet’s source hardware address against
the client hardware address field (CHADDR) in the payload.
Dell Networking OS ensures that the packet’s source MAC address is checked against the CHADDR field
in the DHCP header only for packets from snooped VLANs.
• Enable DHCP MAC SAV.
CONFIGURATION mode
ip dhcp snooping verify mac-address
Enabling IP+MAC Source Address Validation
IP source address validation (SAV) validates the IP source address of an incoming packet and optionally
the VLAN ID of the client against the DHCP snooping binding table. IP+MAC SAV ensures that the IP
Dynamic Host Configuration Protocol (DHCP)
267
Summary of Contents for Z9000
Page 1: ...Dell Configuration Guide for the Z9000 System 9 7 0 0 ...
Page 80: ...grub reboot 80 Management ...
Page 128: ... 0 Te 1 1 Te 1 2 rx Flow N A N A 128 Access Control Lists ACLs ...
Page 491: ...Figure 70 Configuring OSPF and BGP for MSDP Multicast Source Discovery Protocol MSDP 491 ...
Page 496: ...Figure 73 MSDP Default Peer Scenario 1 496 Multicast Source Discovery Protocol MSDP ...
Page 497: ...Figure 74 MSDP Default Peer Scenario 2 Multicast Source Discovery Protocol MSDP 497 ...
Page 498: ...Figure 75 MSDP Default Peer Scenario 3 498 Multicast Source Discovery Protocol MSDP ...
Page 760: ...Figure 100 Single and Double Tag TPID Match 760 Service Provider Bridging ...
Page 761: ...Figure 101 Single and Double Tag First byte TPID Match Service Provider Bridging 761 ...