Chapter 22: DHCP Snooping
304
Overview
The DHCP Snooping feature provides security by inspecting ingress
packets for the correct IP and MAC address information. The DHCP
Snooping feature defines the AT-GS950/48 ports as either trusted or
untrusted. With DHCP Snooping enabled, two network security issues are
addressed:
All ingress DHCP packets are examined on the
untrusted ports and only authorized packets are
passed through the switch. Unwanted ingress DHCP
packets are discarded. See "Unauthorized DHCP
Servers" below.
DHCP ingress packets on an untrusted port are
inspected to insure that the source IP Address and
MAC Address combination in each packet is valid
when compared to the DHCP Snooping Binding Table.
If a match is not found, the packet is discarded.
Trusted Ports
By definition, trusted ports inherently trust all ingress Ethernet traffic.
There is no checking or testing on ingress packets for this type of port. A
trusted port connects to a DHCP server in one of the following ways:
Directly to the legitimate trusted DHCP Server
A network device relaying DHCP messages to and
from a trusted server
Another trusted source such as a switch with DHCP
Snooping enabled
Untrusted Ports
The Ethernet traffic on an untrusted port is inherently not trusted. The
ingress packets are consequently tested against specific criteria to
determine if they can be forwarded through the switch or should be
immediately discarded. Untrusted ports are connected to DHCP clients
and to traffic that originates outside of the LAN.
Unauthorized
DHCP Servers
Normally in a network, a single DHCP server exists in a local area network
(LAN). The DHCP server supplies network configuration information to
individual devices on the network, including the assigned IP address for
each host. A trusted DHCP server is connected to a trusted port on the
switch.
It is possible that another unauthorized and unwanted DHCP server could
be connected to the network. This situation can occur if a client on the
network happens to enable a DHCP server application on his workstation
or if someone outside the network attempts to send DHCP packets to your
network. These situations pose a security risk.
Summary of Contents for AT-GS950/48
Page 10: ...Contents 10...
Page 14: ...Figures 14...
Page 16: ...List of Tables 16...
Page 20: ...Preface 20...
Page 22: ...22...
Page 62: ...Chapter 2 System Configuration 62...
Page 64: ...64...
Page 108: ...Chapter 6 Static Port Trunking 108...
Page 124: ...Chapter 8 Port Mirroring 124...
Page 186: ...Chapter 13 Virtual LANs 186...
Page 194: ...Chapter 14 GVRP 194...
Page 210: ...210...
Page 224: ...Chapter 16 SNMPv1 and v2c 224...
Page 242: ...Chapter 17 SNMPv3 242...
Page 258: ...Chapter 18 Access Control Configuration 258...
Page 272: ...Chapter 19 RMON 272...
Page 302: ...Chapter 21 Security 302...
Page 324: ...Chapter 23 LLDP 324...
Page 338: ...338...
Page 356: ...Chapter 27 LED ECO Mode 356...
Page 360: ...Chapter 28 Energy Efficient Ethernet 360...
Page 370: ...Chapter 29 Rebooting the AT GS950 48 370...
Page 392: ...Appendix A MSTP Overview 392...