
C
HAPTER
13
| Security Measures
DHCP Snooping
– 327 –
◆
The rate limit for the number of DHCP messages that can be processed
by the switch is 100 packets per second. Any DHCP packets in excess of
this limit are dropped.
◆
When DHCP snooping is enabled, DHCP messages entering an
untrusted interface are filtered based upon dynamic entries learned via
DHCP snooping.
◆
Filtering rules are implemented as follows:
■
If the global DHCP snooping is disabled, all DHCP packets are
forwarded.
■
If DHCP snooping is enabled globally, and also enabled on the VLAN
where the DHCP packet is received, all DHCP packets are forwarded
for a
trusted
port. If the received packet is a DHCP ACK message, a
dynamic DHCP snooping entry is also added to the binding table.
■
If DHCP snooping is enabled globally, and also enabled on the VLAN
where the DHCP packet is received, but the port is
not trusted
, it is
processed as follows:
■
If the DHCP packet is a reply packet from a DHCP server
(including OFFER, ACK or NAK messages), the packet is
dropped.
■
If the DHCP packet is from a client, such as a DECLINE or
RELEASE message, the switch forwards the packet only if the
corresponding entry is found in the binding table.
■
If the DHCP packet is from a client, such as a DISCOVER,
REQUEST, INFORM, DECLINE or RELEASE message, the packet
is forwarded if MAC address verification is disabled. However, if
MAC address verification is enabled, then the packet will only be
forwarded if the client’s hardware address stored in the DHCP
packet is the same as the source MAC address in the Ethernet
header.
■
If the DHCP packet is not a recognizable type, it is dropped.
■
If a DHCP packet from a client passes the filtering criteria above, it
will only be forwarded to trusted ports in the same VLAN.
■
If a DHCP packet is from server is received on a trusted port, it will
be forwarded to both trusted and untrusted ports in the same VLAN.
■
If the DHCP snooping is globally disabled, all dynamic bindings are
removed from the binding table.
■
Additional considerations when the switch itself is a DHCP client
–
The port(s) through which the switch submits a client request to the
DHCP server must be configured as trusted. Note that the switch
will not add a dynamic entry for itself to the binding table when it
receives an ACK message from a DHCP server. Also, when the
switch sends out DHCP client packets for itself, no filtering takes
place. However, when the switch receives any messages from a
Summary of Contents for ECS4610-24F
Page 1: ...Management Guide www edge core com ECS4610 24F 24 Port Layer 3 Gigabit Ethernet Switch...
Page 2: ......
Page 4: ......
Page 6: ...ABOUT THIS GUIDE 6...
Page 36: ...CONTENTS 36...
Page 48: ...FIGURES 48...
Page 54: ...TABLES 54...
Page 56: ...SECTION I Getting Started 56...
Page 78: ...CHAPTER 2 Initial Switch Configuration Managing System Files 78...
Page 80: ...SECTION II Web Configuration 80 Unicast Routing on page 483 Multicast Routing on page 541...
Page 100: ...CHAPTER 3 Using the Web Interface Navigating the Web Browser Interface 100...
Page 124: ...CHAPTER 4 Basic Management Tasks Resetting the System 124...
Page 186: ...CHAPTER 6 VLAN Configuration Configuring MAC based VLANs 186...
Page 194: ...CHAPTER 7 Address Table Settings Clearing the Dynamic Address Table 194...
Page 218: ...CHAPTER 8 Spanning Tree Algorithm Configuring Interface Settings for MSTP 218...
Page 220: ...CHAPTER 9 Rate Limit Configuration 220 Figure 103 Configuring Rate Limits...
Page 222: ...CHAPTER 10 Storm Control Configuration 222 Figure 104 Configuring Broadcast Storm Control...
Page 238: ...CHAPTER 11 Quality of Service Attaching a Policy Map to a Port 238...
Page 334: ...CHAPTER 13 Security Measures DHCP Snooping 334...
Page 430: ...CHAPTER 15 Multicast Filtering Multicast VLAN Registration 430...
Page 540: ...CHAPTER 20 Unicast Routing Configuring the Open Shortest Path First Protocol Version 2 540...
Page 564: ...CHAPTER 21 Multicast Routing Configuring PIM for IPv4 564 Figure 375 Showing RP Mapping...
Page 578: ...CHAPTER 22 Using the Command Line Interface CLI Command Groups 578...
Page 628: ...CHAPTER 24 System Management Commands Time Range 628...
Page 648: ...CHAPTER 25 SNMP Commands 648...
Page 656: ...CHAPTER 26 Remote Monitoring Commands 656...
Page 786: ...CHAPTER 30 Interface Commands 786...
Page 800: ...CHAPTER 32 Port Mirroring Commands Local Port Mirroring Commands 800...
Page 902: ...CHAPTER 38 Quality of Service Commands 902...
Page 950: ...CHAPTER 39 Multicast Filtering Commands IGMP Proxy Routing 950...
Page 968: ...CHAPTER 40 LLDP Commands 968...
Page 978: ...CHAPTER 41 Domain Name Service Commands 978...
Page 1084: ...CHAPTER 45 IP Routing Commands Open Shortest Path First OSPFv2 1084...
Page 1114: ...SECTION IV Appendices 1114...
Page 1120: ...APPENDIX A Software Specifications Management Information Bases 1120...
Page 1142: ...COMMAND LIST 1142...
Page 1152: ...INDEX 1152...
Page 1153: ......