MES53xx, MES33xx, MES23xx Ethernet Switch Series
162
show ip dhcp snooping
[gigabitethernet
gi_port
|
tengigabitethernet
te_port
|
fortygigabitethernet
fo_port
|
port-channel
group
]
gi_port: (1..8/0/1..48);
te_port: (1..8/0/1..24);
fo_port: (1..8/0/1..4);
group: (1..16)
Show DHCP management function configuration.
show ip dhcp snooping
binding *macaddress
mac_address
+ *ipaddress
ip_address
] [vlan
vlan_id
]
[
gigabitethernet
gi_port
|
tengigabitethernet
te_port
|
fortygigabitethernet
fo_port
|
portchannel
group
]
gi_port: (1..8/0/1..48);
te_port: (1..8/0/1..24);
fo_port: (1..8/0/1..4);
group: (1..16);
vlan_id: (1..4094)
Show mappings from the DHCP management file (database).
Examples of command usage
Enable the use of DHCP Option 82.
console#
configure
console(config)#
ip dhcp relay enable
console(config)#
ip dhcp information option
Show all mappings from the DHCP management file (database).
console#
show ip dhcp snooping
DHCP snooping is globally enabled
DHCP snooping is configured on following VLANs: 2, 5
DHCP snooping database: enabled
Option 82 on untrusted port is allowed
Verification of hwaddr field is enabled
Interface
Trusted
----------- ------------
te0/17
yes
11.1.4
Client IP address protection (IP Source Guard)
IP address protection function (IP Source Guard) filters the traffic received from the interface based
on DHCP snooping table and IP Source Guard static mappings. Thus, IP Source Guard eliminates IP address
spoofing in packets.
Given that the IP address protection feature uses DHCP snooping mapping tables, it makes
sense to use it after enabling and configuring DHCP snooping.
IP Source Guard must be enabled for the interface and globally.
Global configuration mode commands
Command line prompt in the global configuration mode is as follows:
console(config)#
Table 5.181. Global configuration mode commands
Command
Value/Default value
Action
ip source-guard
The function is disabled by
default.
Enable client IP address protection function for the entire
switch.