
C
HAPTER
25
| General Security Measures
DHCP Snooping
– 675 –
■
If the DHCP packet is from a client, such as a DECLINE or
RELEASE message, the switch forwards the packet only if the
corresponding entry is found in the binding table.
■
If the DHCP packet is from client, such as a DISCOVER,
REQUEST, INFORM, DECLINE or RELEASE message, the packet
is forwarded if MAC address verification is disabled (as specified
by the
ip dhcp snooping verify mac-address
command).
However, if MAC address verification is enabled, then the packet
will only be forwarded if the client’s hardware address stored in
the DHCP packet is the same as the source MAC address in the
Ethernet header.
■
If the DHCP packet is not a recognizable type, it is dropped.
■
If a DHCP packet from a client passes the filtering criteria above, it
will only be forwarded to trusted ports in the same VLAN.
■
If a DHCP packet is from server is received on a trusted port, it will
be forwarded to both trusted and untrusted ports in the same VLAN.
◆
If the DHCP snooping is globally disabled, all dynamic bindings are
removed from the binding table.
◆
Additional considerations when the switch itself is a DHCP client
– The
port(s) through which the switch submits a client request to the DHCP
server must be configured as trusted (using the
command). Note that the switch will not add a dynamic entry for itself
to the binding table when it receives an ACK message from a DHCP
server. Also, when the switch sends out DHCP client packets for itself,
no filtering takes place. However, when the switch receives any
messages from a DHCP server, any packets received from untrusted
ports are dropped.
E
XAMPLE
This example enables DHCP snooping globally for the switch.
Console(config)#ip dhcp snooping
Console(config)#
R
ELATED
C
OMMANDS
Summary of Contents for ES3510MA-DC
Page 1: ...Management Guide www edge core com 8 Port Layer 2 Fast Ethernet Switch...
Page 2: ......
Page 4: ......
Page 6: ...ABOUT THIS GUIDE 6...
Page 44: ...FIGURES 44...
Page 50: ...TABLES 50...
Page 52: ...SECTION I Getting Started 52...
Page 62: ...CHAPTER 1 Introduction System Defaults 62...
Page 80: ...CHAPTER 2 Initial Switch Configuration Managing System Files 80...
Page 82: ...SECTION II Web Configuration 82...
Page 98: ...CHAPTER 3 Using the Web Interface Navigating the Web Browser Interface 98...
Page 126: ...CHAPTER 4 Basic Management Tasks Resetting the System 126...
Page 164: ...CHAPTER 5 Interface Configuration VLAN Trunking 164 Figure 57 Configuring VLAN Trunking...
Page 202: ...CHAPTER 7 Address Table Settings Configuring MAC Address Mirroring 202...
Page 452: ...CHAPTER 17 IP Services Displaying the DNS Cache 452...
Page 498: ...CHAPTER 19 Using the Command Line Interface CLI Command Groups 498...
Page 588: ...CHAPTER 22 SNMP Commands 588...
Page 596: ...CHAPTER 23 Remote Monitoring Commands 596...
Page 650: ...CHAPTER 24 Authentication Commands Management IP Filter 650...
Page 738: ...CHAPTER 27 Interface Commands 738...
Page 760: ...CHAPTER 29 Port Mirroring Commands RSPAN Mirroring Commands 760...
Page 782: ...CHAPTER 32 Address Table Commands 782...
Page 810: ...CHAPTER 33 Spanning Tree Commands 810...
Page 862: ...CHAPTER 35 VLAN Commands Configuring Voice VLANs 862...
Page 876: ...CHAPTER 36 Class of Service Commands Priority Commands Layer 3 and 4 876...
Page 932: ...CHAPTER 38 Multicast Filtering Commands Multicast VLAN Registration 932...
Page 956: ...CHAPTER 39 LLDP Commands 956...
Page 1020: ...CHAPTER 42 Domain Name Service Commands 1020...
Page 1026: ...CHAPTER 43 DHCP Commands DHCP Client 1026...
Page 1058: ...CHAPTER 44 IP Interface Commands IPv6 Interface 1058...
Page 1060: ...SECTION IV Appendices 1060...
Page 1066: ...APPENDIX A Software Specifications Management Information Bases 1066...
Page 1088: ...COMMAND LIST 1088...
Page 1097: ......