Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

header-navigation
keyboard_arrow_up
close
keyboard_arrow_left
Security Services Administration Guide
Table of Contents Expand all
list Table of Contents
file_download PDF
{ "lLangCode": "en", "lName": "English", "lCountryCode": "us", "transcode": "en_US" }
English
keyboard_arrow_right

Configuring IP Source Guard to Mitigate the Effects of Source IP Address Spoofing and Source MAC Address Spoofing

date_range 24-Nov-23

You can use the IP source guard access port security feature on MX Series routers to mitigate the effects of source IP address spoofing and source MAC address spoofing. If IP source guard determines that a host connected to an access interface has sent a packet with an invalid source IP address or source MAC address in the packet header, then IP source guard ensures that the switching device does not forward the packet—that is, the packet is discarded.

To configure IP source guard on a specific bridge domain by using the CLI:

Configure the IP source guard on a bridge domain:
content_copy zoom_out_map
[edit bridge-domains bridge-domain-name forwarding-options dhcp-security]
user@device# set  ip-source-guard (MX Series)

To configure IP source guard at the routing instance level by using the CLI:

  • Configure the IP source guard at the routing instance level:

    content_copy zoom_out_map
    [edit routing-instances ri-name bridge-domains bridge-domain-name forwarding-options dhcp-security]
    user@device# set  ip-source-guard (MX Series)
footer-navigation