
C
HAPTER
26
| General Security Measures
DHCP Snooping
– 770 –
ip dhcp snooping
This command enables DHCP snooping globally. Use the
no
form to restore
the default setting.
S
YNTAX
[
no
]
ip dhcp snooping
D
EFAULT
S
ETTING
Disabled
C
OMMAND
M
ODE
Global Configuration
C
OMMAND
U
SAGE
◆
Network traffic may be disrupted when malicious DHCP messages are
received from an outside source. DHCP snooping is used to filter DHCP
messages received on an unsecure interface from outside the network
or fire wall. When DHCP snooping is enabled globally by this command,
and enabled on a VLAN interface by the
ip dhcp snooping vlan
command, DHCP messages received on an untrusted interface (as
specified by the
no
ip dhcp snooping trust
command) from a device not
listed in the DHCP snooping table will be dropped.
◆
When enabled, DHCP messages entering an untrusted interface are
filtered based upon dynamic entries learned via DHCP snooping.
◆
Table entries are only learned for trusted interfaces. Each entry
includes a MAC address, IP address, lease time, VLAN identifier, and
port identifier.
◆
When DHCP snooping is enabled, the rate limit for the number of DHCP
messages that can be processed by the switch is 100 packets per
second. Any DHCP packets in excess of this limit are dropped.
◆
Filtering rules are implemented as follows:
■
If the global DHCP snooping is disabled, all DHCP packets are
forwarded.
■
If DHCP snooping is enabled globally, and also enabled on the VLAN
where the DHCP packet is received, all DHCP packets are forwarded
for a
trusted
port. If the received packet is a DHCP ACK message, a
dynamic DHCP snooping entry is also added to the binding table.
■
If DHCP snooping is enabled globally, and also enabled on the VLAN
where the DHCP packet is received, but the port is
not trusted
, it is
processed as follows:
■
If the DHCP packet is a reply packet from a DHCP server
(including OFFER, ACK or NAK messages), the packet is
dropped.
Summary of Contents for ECS4810-12M Layer 2
Page 1: ...Management Guide www edge core com ECS4810 12M Layer 2 Gigabit Ethernet Switch...
Page 2: ......
Page 4: ......
Page 6: ...ABOUT THIS GUIDE 6...
Page 54: ...SECTION I Getting Started 54...
Page 64: ...CHAPTER 1 Introduction System Defaults 64...
Page 82: ...CHAPTER 2 Initial Switch Configuration Managing System Files 82...
Page 84: ...SECTION II Web Configuration 84...
Page 102: ...CHAPTER 3 Using the Web Interface Navigating the Web Browser Interface 102...
Page 206: ...CHAPTER 6 VLAN Configuration Configuring VLAN Mirroring 206...
Page 256: ...CHAPTER 11 Class of Service Layer 3 4 Priority Settings 256...
Page 378: ...CHAPTER 14 Security Measures DHCP Snooping 378...
Page 520: ...CHAPTER 16 IP Configuration Setting the Switch s IP Address IP Version 6 520...
Page 528: ...CHAPTER 17 IP Services Displaying the DNS Cache 528...
Page 586: ...CHAPTER 19 Using the Command Line Interface CLI Command Groups 586...
Page 676: ...CHAPTER 22 SNMP Commands 676...
Page 684: ...CHAPTER 23 Remote Monitoring Commands 684...
Page 816: ...CHAPTER 27 Access Control Lists ACL Information 816...
Page 866: ...CHAPTER 30 Port Mirroring Commands RSPAN Mirroring Commands 866...
Page 884: ...CHAPTER 32 Automatic Traffic Control Commands 884...
Page 890: ...CHAPTER 33 Address Table Commands 890...
Page 986: ...CHAPTER 37 Class of Service Commands Priority Commands Layer 3 and 4 986...
Page 1006: ...CHAPTER 38 Quality of Service Commands 1006...
Page 1068: ...CHAPTER 39 Multicast Filtering Commands Multicast VLAN Registration 1068...
Page 1092: ...CHAPTER 40 LLDP Commands 1092...
Page 1134: ...CHAPTER 41 CFM Commands 1134...
Page 1154: ...CHAPTER 43 Domain Name Service Commands 1154...
Page 1160: ...CHAPTER 44 DHCP Commands DHCP Client 1160...
Page 1194: ...CHAPTER 45 IP Interface Commands IPv6 Interface 1194...
Page 1196: ...SECTION IV Appendices 1196...
Page 1202: ...APPENDIX A Software Specifications Management Information Bases 1202...
Page 1224: ...COMMAND LIST 1224...
Page 1234: ...INDEX 1234...
Page 1235: ......