Chapter 4. Web Configuration & Operation
213
CHAPTER 4
WEB OPERATION & CONFIGURATION
4.3.3.2 DHCP Snooping
DHCP Snooping allows the switch to protect a network from being attacked by other devices or rogue DHCP servers.
When DHCP Snooping is enabled on the switch, it can filter IP traffic on insecure (untrusted) ports that the source
addresses cannot be identified by DHCP Snooping. The addresses assigned to connected clients on insecure ports can
be carefully controlled by either using the dynamic binding registered with DHCP Snooping or using the static binding
configured with IP Source Guard.
DHCP Snooping Configuration
Snooping Mode:
Enable or disable DHCP Snooping function globally. When DHCP snooping mode operation is enabled,
the DHCP request messages from trusted ports will be processed and only allow reply packets from trusted ports.
VLAN:
A single VLAN or a range of
VLANs specified here will be treated as authorized and secure VLANs. Packets from
specified VLANs are forwarded normally.
DHCP Snooping Table Saving
Server URL:
Specify the TFTP server URL including path and file name to save the DHCP Snooping table. The URL
format might look like: tftp://server/pather-and-filename
Retransmit:
Specify the “Retransmit” value. When the server does not respond to requests, the device will keep
transmitting requests for the number of times specified here. The valid Retransmit value is 1 to 5.
Interval:
Specify the “Interval” value. This value determines the interval that DHCP Snooping table is saved to a server.
The valid value is 10 to 86400 seconds.
DHCP Snooping Table Restoring
Server URL:
Specify the TFTP server URL including path and file name to restore a saved DHCP Snooping table.
Summary of Contents for MSW-4424C Series
Page 1: ...1 MSW 4424C MSW 4424CS L2 Gigabit Carrier Ethernet Switch ...
Page 382: ......