Got it

IPSG

Created: Jul 25, 2021 18:54:17Latest reply: Jul 31, 2021 02:45:46 328 2 0 1 0
  Rewarded HiCoins: 0 (problem resolved)
Hello security team,
What is IPSG and what are the uses? How we can integrate without hampering user experience

Featured Answers

Recommended answer

DDSN
Admin Created Jul 26, 2021 01:05:17

Hi BAZ,
IPSG is short for IP Source Guard. When functioning as a Layer 2 device, the device uses the binding table to defend against IP source spoofing attacks.
IPSG checks IP packets based on DHCP dynamic and static binding tables. When forwarding an IP packet, the device compares the source IP address, source MAC address, interface, and VLAN information in the packet with information in the binding table. If the information matches, the user is authorized and the packet can be forwarded normally. Otherwise, the device considers the IP packet as an attack packet and discards the IP packet.
For example, a user goes online through DHCP. After the switch goes online, the switch generates a binding table for the user based on the DHCP ACK packet. The binding table contains the source IP address, source MAC address, port number, and VLAN information of the user. When a user sends an IP packet, SwitchA checks whether the IP packet matches the binding table of the user. If the IP packet matches the binding table of the user, SwitchA allows the packet to pass through. Otherwise, SwitchA discards the IP packet. In this way, IP packets sent by authorized users are allowed to pass through, but attackers send fake IP packets that cannot match the binding table. As a result, the packets are discarded and cannot attack other users.
View more
  • x
  • convention:

All Answers
DDSN
DDSN Admin Created Jul 26, 2021 01:05:17

Hi BAZ,
IPSG is short for IP Source Guard. When functioning as a Layer 2 device, the device uses the binding table to defend against IP source spoofing attacks.
IPSG checks IP packets based on DHCP dynamic and static binding tables. When forwarding an IP packet, the device compares the source IP address, source MAC address, interface, and VLAN information in the packet with information in the binding table. If the information matches, the user is authorized and the packet can be forwarded normally. Otherwise, the device considers the IP packet as an attack packet and discards the IP packet.
For example, a user goes online through DHCP. After the switch goes online, the switch generates a binding table for the user based on the DHCP ACK packet. The binding table contains the source IP address, source MAC address, port number, and VLAN information of the user. When a user sends an IP packet, SwitchA checks whether the IP packet matches the binding table of the user. If the IP packet matches the binding table of the user, SwitchA allows the packet to pass through. Otherwise, SwitchA discards the IP packet. In this way, IP packets sent by authorized users are allowed to pass through, but attackers send fake IP packets that cannot match the binding table. As a result, the packets are discarded and cannot attack other users.
View more
  • x
  • convention:

Hi,

Does the answer fit your question? Your valuable feedback would help our improvement.


View more
  • x
  • convention:

Comment

You need to log in to comment to the post Login | Register
Comment

Notice: To protect the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but are not limited to the following:
  • Politically sensitive content
  • Content concerning pornography, gambling, and drug abuse
  • Content that may disclose or infringe upon others ' commercial secrets, intellectual properties, including trade marks, copyrights, and patents, and personal privacy
Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see " User Agreement."

My Followers

Login and enjoy all the member benefits

Login

Block
Are you sure to block this user?
Users on your blacklist cannot comment on your post,cannot mention you, cannot send you private messages.
Reminder
Please bind your phone number to obtain invitation bonus.