3-5
z
Filtering the source IP address in a packet. If the source IP address and the number of the port that
receives the packet are consistent with entries in the DHCP-snooping table or static binding table,
the switch regards the packet as a valid packet and forwards it; otherwise, the switch drops it
directly.
z
Filtering the source IP address and the source MAC address in a packet. If the source IP address
and source MAC address in the packet, and the number of the port that receives the packet are
consistent with entries in the DHCP-snooping table or static binding table, the switch regards the
packet as a valid packet and forwards it; otherwise, the switch drops it directly.
DHCP Snooping Configuration
Configuring DHCP Snooping
Follow these steps to configure DHCP snooping:
Operation
Command
Description
Enter system view
system-view
—
Enable DHCP snooping
dhcp-snooping
Required
By default, the DHCP snooping function
is disabled.
After DHCP snooping is enabled on a Switch 4210, clients connected with this switch cannot obtain IP
addresses dynamically through BOOTP.
Configuring DHCP Snooping Trusted/Untrusted Ports
Follow these steps to configure DHCP Snooping Trusted/Untrusted Ports:
Operation
Command
Description
Enter system view
system-view
—
Enter Ethernet port view
interface interface-type
interface-number
—
Specify the current port
as a trusted port
dhcp-snooping trust
Required
By default, after DHCP snooping is
enabled, all ports of the switch are
untrusted ports.