290
C
HAPTER
17: N
ETWORK
P
ROTOCOL
O
PERATION
6
Return to system view.
[S5500-vlan-interface 100]
quit
7
Enable option 82 supporting on the DHCP relay, with the
keep
keyword specified.
[S5500]
dhcp relay information enable
[S5500]
dhcp relay information strategy keep
Introduction to DHCP
Snooping
For the sake of security, the IP addresses used by online DHCP clients need to be
tracked for the administrator to verify the corresponding relationship between the IP
addresses the DHCP clients obtained from DHCP servers and the MAC addresses of
the DHCP clients.
■
Layer 3 switches can track DHCP client IP addresses through DHCP relay.
■
Layer 2 switches can track DHCP client IP addresses through the DHCP snooping
function, which listens DHCP broadcast packets.
When an unauthorized DHCP server exists in the network, a DHCP client may obtains
an illegal IP address. To ensure that the DHCP clients obtain IP addresses from valid
DHCP servers, you can specify a port to be a trusted port or an untrusted port by the
DHCP snooping function.
■
Trusted ports can be used to connect DHCP servers or ports of other switches.
Untrusted ports can be used to connect DHCP clients or networks.
■
Trusted ports forward any received DHCP packets to ensure that DHCP clients can
obtain IP addresses from valid DHCP servers. Untrusted ports discard the
DHCP-ACK and DHCP-OFFER responses received from DHCP servers.
Figure 70 illustrates a typical network diagram for DHCP snooping application, where
Switch A is an S5500 series switch.
Figure 70
Typical network diagram for DHCP snooping application
Figure 71 illustrates the interaction between a DHCP client and a DHCP server
Summary of Contents for 5500 SI - Switch - Stackable
Page 24: ...24 ABOUT THIS GUIDE...
Page 50: ...50 CHAPTER 1 GETTING STARTED...
Page 54: ...54 CHAPTER 2 ADDRESS MANAGEMENT CONFIGURATION...
Page 78: ...78 CHAPTER 3 PORT OPERATION...
Page 88: ...88 CHAPTER 4 XRN CONFIGURATION...
Page 122: ...122 CHAPTER 8 VLAN VPN CONFIGURATION...
Page 216: ...216 CHAPTER 15 SSH TERMINAL SERVICES...
Page 268: ...268 CHAPTER 16 IP ROUTING PROTOCOL OPERATION...
Page 308: ...308 CHAPTER 17 NETWORK PROTOCOL OPERATION...
Page 349: ...349...
Page 350: ...350 CHAPTER 18 MULTICAST PROTOCOL...
Page 522: ...522 CHAPTER 22 FILE SYSTEM MANAGEMENT...
Page 584: ...584 CHAPTER 30 PASSWORD CONTROL CONFIGURATION OPERATIONS...
Page 600: ...600 CHAPTER 31 MSDP CONFIGURATION...
Page 614: ...614 CHAPTER 32 CLUSTERING...
Page 670: ...670 CHAPTER C AUTHENTICATING THE SWITCH 5500 WITH CISCO SECURE ACS...