
What IP Source Guard does:
IP Source Guard (IPSG) is a security feature that blocks any IP traffic whose (port, VLAN, IP, MAC) does not match a trusted binding. On IGS-10020PT, these bindings come from:
1. DHCP Snooping Table (dynamic entries learned from DHCP traffic):

2. Static IP Source Guard entries that you configure manually.

Effectively:
This is designed to stop IP spoofing, especially when you use IP-based ACLs as your main access control method.
Q1. Why all hosts lose connectivity after IP Source Guard is enabled:
A. IPSG is very strict. If it does not find a valid binding, it will drop all IP packets on that port.
Common reasons everything suddenly goes down:
1. DHCP Snooping is not correctly configured
2. Clients are using static IP addresses
3. Max Dynamic Clients = 0 on the port
Example Topology:

Topology:
Pre-configured:
Access list:

This ACL means:
Test connectivity

Bypass IP-based ACL by spoofing PC1’s IP:
A. Let’s look at what happened before IPSG was enabled:
1. Normal behavior (no spoofing):
2. Spoofing with Scapy on PC2:

→ ACE 1 counter increases from 5 to 10 (5 from PC1 + 5 from spoofed PC2 pings).

Result: PC2 successfully pretended to be PC1 and bypassed your IP-based ACL. ACL alone cannot stop this; it does not verify that the IP belongs to the MAC/port that originally got it.
Enable IP Source Guard and block spoofed ping from PC2:
1. Verify DHCP Snooping and ARP Inspection are working


2. Enable Global IP Source Guard
3. Enable IP Source Guard on the client ports

4. Verify the Dynamic IP Source Guard Table

Now IPSG is correctly configured and does not break normal communication, but it will stop IP spoofing attempts.
Once IPSG is enabled and DHCP Snooping has built the bindings, the switch automatically creates hidden ACEs that look like:

The important part is that these permit ACEs are tied to specific ports and MACs, not just IP.
Now consider spoofing test again:
1. PC2 (on Port 5) sends packets with:

2. IP Source Guard checks:
→ No, Port 5 is bound to IP 192.168.10.102.
3. So the packet matches ipSourceGuard ACE 1 deny all.


Result: IP Source Guard prevents PC2 from using PC1’s IP, even though your IP-based ACL would otherwise have allowed those packets.
Q2. Does IP Source Guard replace DHCP Snooping, ARP Inspection, or ACLs?
A. No – they work together:
A good rule of thumb for access networks:
DHCP Snooping + ARP Inspection + IP Source Guard + IP-based ACLs gives you both strong identity (per IP/MAC/port) and flexible policy control.
To recover the default IP address and password, please follow the following steps.


1. Check the LNK/ACT LED on the switch.
2. Try another port on the Switch.
3. Make sure the cable is installed properly.
4. Make sure the cable is the right type.
5. Turn off the power. After a while, turn on power again.
1. Check the LNK/ACT LED on the switch.
2. Try another port on the Switch.
3. Make sure the cable is installed properly.
4. Make sure the cable is the right type.
5. Turn off the power. After a while, turn on power again.
[GSD-804P(V3)] Check the LNK/ACT LED on the GSD-804P. Try another port on the GSD-804P. Make sure the cable is installed properly. Make sure the cable is the right type. Turn off the power. After a while, turn on the power again.