
1. What is DHCP Snooping?
DHCP Snooping is a security feature that protects your network from rogue DHCP servers.
When enabled, the switch:
IGS-5225-8P4S-12V DHCP Snooping prevents an attacker on an access port from handing out fake IP addresses or wrong gateways to clients.
2. Example topology:

Goal:
3. Enable DHCP Snooping on the IGS-5225:
3.1 Global settings: Snooping Mod

When Snooping Mode is Enabled, the switch forwards DHCP requests from clients toward trusted ports and only allows DHCP reply packets from trusted ports. Replies from untrusted ports are blocked.

This ensures:
4. Click Apply.
5. Verify DHCP Snooping:
The IGS-5225 provides a Dynamic DHCP Snooping Table that shows all valid bindings learned while snooping is enabled.

This table confirms that:
1. What is ARP Inspection?
ARP Inspection protects your network against ARP spoofing/poisoning.
A malicious or misconfigured host can forge ARP packets to change the IP–MAC mapping in another device’s ARP cache and hijack traffic.
On the IGS-6329-8UP2S4X, ARP Inspection validates ARP requests and replies against a list of trusted IP–MAC–VLAN–port bindings and drops invalid ARP packets.
When you use DHCP Snooping, those trusted bindings are learned automatically from DHCP exchanges. ARP Inspection then uses that same database to allow only the real owner of an IP address to send ARP traffic.
2. Example Topology:
- Behavior before enabling ARP Inspection:

1. PC1 sends DHCPDISCOVER and legally gets IP 192.168.10.101 from the DHCP server.
2. SW1’s Dynamic DHCP Snooping Table shows a binding:


3. PC2 is manually configured with IP 192.168.10.101 on port 5.
4. When PC2 pings the gateway 192.168.10.254, it sends ARP replies claiming 192.168.10.101 with PC2’s MAC.

DHCP Snooping alone doesn’t stop this, because it controls DHCP replies, not ARP.
- Behavior after enabling ARP Inspection:




3. How ARP Inspection works on IGS-6329-8UP2S4X
ARP Inspection has three main pieces:
In addition, there are two ARP Inspection tables:
In this DHCP-based lab, we rely mainly on dynamic bindings from DHCP Snooping.

What IP Source Guard does:
IP Source Guard (IPSG) is a security feature that blocks any IP traffic whose (port, VLAN, IP, MAC) does not match a trusted binding. On IGS-10020PT, these bindings come from:
1. DHCP Snooping Table (dynamic entries learned from DHCP traffic):

2. Static IP Source Guard entries that you configure manually.

Effectively:
This is designed to stop IP spoofing, especially when you use IP-based ACLs as your main access control method.
Q1. Why all hosts lose connectivity after IP Source Guard is enabled:
A. IPSG is very strict. If it does not find a valid binding, it will drop all IP packets on that port.
Common reasons everything suddenly goes down:
1. DHCP Snooping is not correctly configured
2. Clients are using static IP addresses
3. Max Dynamic Clients = 0 on the port
Example Topology:

Topology:
Pre-configured:
Access list:

This ACL means:
Test connectivity

Bypass IP-based ACL by spoofing PC1’s IP:
A. Let’s look at what happened before IPSG was enabled:
1. Normal behavior (no spoofing):
2. Spoofing with Scapy on PC2:

→ ACE 1 counter increases from 5 to 10 (5 from PC1 + 5 from spoofed PC2 pings).

Result: PC2 successfully pretended to be PC1 and bypassed your IP-based ACL. ACL alone cannot stop this; it does not verify that the IP belongs to the MAC/port that originally got it.
Enable IP Source Guard and block spoofed ping from PC2:
1. Verify DHCP Snooping and ARP Inspection are working


2. Enable Global IP Source Guard
3. Enable IP Source Guard on the client ports

4. Verify the Dynamic IP Source Guard Table

Now IPSG is correctly configured and does not break normal communication, but it will stop IP spoofing attempts.
Once IPSG is enabled and DHCP Snooping has built the bindings, the switch automatically creates hidden ACEs that look like:

The important part is that these permit ACEs are tied to specific ports and MACs, not just IP.
Now consider spoofing test again:
1. PC2 (on Port 5) sends packets with:

2. IP Source Guard checks:
→ No, Port 5 is bound to IP 192.168.10.102.
3. So the packet matches ipSourceGuard ACE 1 deny all.


Result: IP Source Guard prevents PC2 from using PC1’s IP, even though your IP-based ACL would otherwise have allowed those packets.
Q2. Does IP Source Guard replace DHCP Snooping, ARP Inspection, or ACLs?
A. No – they work together:
A good rule of thumb for access networks:
DHCP Snooping + ARP Inspection + IP Source Guard + IP-based ACLs gives you both strong identity (per IP/MAC/port) and flexible policy control.
Please follow the steps below to enable the SSH function on the switch.
1. Go to Security → Access Security → Authentication Method.
2. Set the Authentication Method for SSH to“local”, then click the “Apply” button.

3. Go to Security → Access Security → SSH.
Set the SSH function to“Enabled”, then click the “Apply” button.

4. Save the configuration to apply the changes permanently.
After completing the above steps, the user will be able to access the switch via SSH.
Topology:
The fiber ports are used for ERPS Ring, where VLANs 1 to 3 and 3001 pass through the fiber ports.

To achieve the goal, please refer to the steps below:
l Switch 1:
1. Go to the ERPS page and establish the ERPS ring using the Ring Wizard.

2. Click on the “ERPS” and go to the “ERPS ID”.
3. Go to the VLAN Configuration page.

4. Click the “Add New Entry” button to add VLANs 2 and 3.
5. Go to the Global VLAN Configuration page using the path: Switching → VLAN Port Configuration.
Add multiple VLANs to the ports of the ERPS ring (ports 9 and 10).

6. Go to the IP Configuration page using the path: System → IP Configuration.
Assign the IP addresses to the VLAN 2 and 3 interfaces.

l Repeat the steps above on Switches 2 and 3.
Thus, VLANs 1-3 and 3001 can pass through the fiber ports.
Please refer to the attached calculation to select your PV panel and battery for more understandings, thank you.
PLANET BSP-360 Industrial-grade Renewable Energy PoE+ Managed Switch (BSP-360), built with advanced green technology,
can be charged by renewable energy,making it perfect for remote applications in remote expansive environments such as dams,
national parks, highways and others.
The BSP-360 effectively transfers green energy to PoE power in order to provide electricity to PDs including IP cameras and access
points deployed in the network.
Please refer to the standard application graph with the green power and battery.

Please refer to the standard application graph with the green power, battery,PoE PDs and NMS-360 series.

If there is no green power generator, please refer to this application graph with the PoE PDs and NMS-360 series.
※ The 24V DC power supply must connect to battery DC input terminal block.

NOTE:
1. Please remember to configure all equipment using a different IP address and must in the same subnet.
2. The BSP-360 default IP is 192.168.0.100.
3. The NMS-360 default IP is 192.168.1.100 (https:// 192.168.1.100:8888).