Statements (24)
Predicate | Object |
---|---|
gptkbp:instanceOf |
network security feature
|
gptkbp:block |
unauthorized IP traffic
|
gptkbp:canBeBypassedBy |
static IP assignment (if not configured properly)
|
gptkbp:configuration |
per-port basis
|
gptkbp:hasWorkedWith |
Layer 2
|
https://www.w3.org/2000/01/rdf-schema#label |
IP Source Guard
|
gptkbp:implementedIn |
network switches
|
gptkbp:introducedIn |
gptkb:Cisco
|
gptkbp:monitors |
ingress traffic
|
gptkbp:platform |
gptkb:Cisco
gptkb:Juniper Arista |
gptkbp:prevention |
IP address spoofing
|
gptkbp:protectedBy |
man-in-the-middle attacks
address spoofing attacks egress traffic |
gptkbp:relatedTo |
gptkb:Dynamic_ARP_Inspection
Port Security |
gptkbp:requires |
DHCP snooping
IP-MAC binding |
gptkbp:usedIn |
computer networks
|
gptkbp:bfsParent |
gptkb:Nexus_Switches
gptkb:Cisco_Catalyst_9000 |
gptkbp:bfsLayer |
6
|