IPSG and Port Security
Both IPSG based on a static binding table and port security support MAC and interface binding. Table 11-5 lists their differences.
Table 11-5 Differences between IPSG and port securityFeature | Description | Usage Scenario |
|---|
IPSG | Binds
MAC addresses to interfaces in the binding table so that a host can
only go online through a fixed port. Hosts whose MAC addresses are not
in the binding table cannot go online through the device. The binding entries are manually
configured. If a network has a large number of hosts, the configuration workload is heavy. | In
addition to binding MAC addresses to interfaces, IPSG can bind IP
addresses, MAC addresses, VLANs, and interfaces flexibly. IPSG prevents
IP address spoofing attacks. For example, a malicious host steals an
authorized host's IP address to
access or attack the network. |
Port security | Converts
the limited number of dynamic MAC entries learned by interfaces into
secure MAC entries, so that a host can only go online through a fixed
port. Hosts whose MAC addresses are not in the MAC address table cannot
go online through the
device. Secure MAC entries are dynamically generated. | Port
security prevents access of unauthorized hosts and limits the number of
access hosts. It is applicable to networks with a large number of
hosts. |
If you need only to prevent hosts with unauthorized MAC addresses
from communicating with each other and a large number of hosts reside on
the network, port security is recommended.
IPSG does not fix MAC entries. Therefore, it cannot
prevent MAC address flapping caused by incorrect MAC entry updates. In Figure 11-8, when a malicious host sends data (for example, bogus ARP packets) to the switch by using an authorized host's MAC address, the switch
incorrectly updates the MAC address table. As a result, the malicious
host can intercept the packets destined for the authorized host.
Figure 11-8 Incorrect MAC address table update
To solve the MAC address flapping problem, you can configure the
device to generate snooping MAC entries based on binding tables.
For details about port security, see Port Security Configuration.
IPSG, DAI, static ARP, and port security resolve different issues and
meet different requirements. To improve network security, it is
recommended that you configure them according to your requirements.