IP Security

This section describes a collection of IP security features implemented in ExtremeXOS software.

If you configure any of the features described in this section, you can enhance your network security by controlling which hosts are granted or not granted access to your network.

IP Security Dependencies displays the dependencies of IP security. Any feature that appears directly above another feature depends on it. For example, to configure ARP validation, you must configure DHCP (Dynamic Host Configuration Protocol) snooping and trusted DHCP server.

Click to expand in new window
IP Security Dependencies
GUID-8ADEF4D4-F8B6-4D63-9F0A-944CF5C5D260-low.png
Note

Note

IP security features are supported on link aggregation ports with the exception of DHCP snooping with the block-mac option and source IP lockdown. You can enable IP security on pre-existing trunks, but you cannot make IP security-enabled ports into trunks without first disabling IP security.