IP Security

This section describes a collection of IP security features implemented in ExtremeXOS software.

If you configure any of the features described in this section, you can enhance your network security by controlling which hosts are granted or not granted access to your network.

The following figure displays the dependencies of IP security. Any feature that appears directly above another feature depends on it. For example, to configure ARP validation, you must configure DHCP snooping and trusted DHCP server.

expand icon
IP Security Dependencies
../Graphics/EX_178.svg
Note

Note

IP security features are supported on link aggregation ports with the exception of DHCP snooping with the block-mac option and source IP lockdown. You can enable IP security on pre-existing trunks, but you cannot make IP security-enabled ports into trunks without first disabling IP security.