2-7
DHCP Snooping Configuration Examples
DHCP Snooping Configuration Example
Network requirements
As shown in
Figure 2-3
, Switch A is connected to a DHCP server through GigabitEthernet1/0/1, and to
two DHCP clients through GigabitEthernet1/0/2 and GigabitEthernet1/0/3. GigabitEthernet1/0/1
forwards DHCP server responses while the other two do not.
Switch A records clients’ IP-to-MAC address bindings in DHCP-REQUEST messages and DHCP-ACK
messages received from trusted ports.
Figure 2-3
Network diagram for DHCP snooping configuration
Configuration procedure
# Enable DHCP snooping.
<SwitchA> system-view
[SwitchA] dhcp-snooping
# Specify GigabitEthernet1/0/1 as trusted.
[SwitchA] interface GigabitEthernet 1/0/1
[SwitchA-GigabitEthernet1/0/1] dhcp-snooping trust
[SwitchA-GigabitEthernet1/0/1] quit
DHCP Snooping Option 82 Support Configuration Example
Network requirements
z
As shown in
Figure 2-3
, enable DHCP snooping and Option 82 support on Switch A.
z
Configure the handling strategy for DHCP requests containing Option 82 as
replace
.
z
On GigabitEthernet1/0/2, configure the padding content for the circuit ID sub-option as
company001
and for the remote ID sub-option as
device001
.
z
On GigabitEthernet1/0/3, configure the padding format as
verbose
, access node identifier as
sysname
, and code type as
ascii
for Option 82.
z
Switch A forwards DHCP requests to the DHCP server after replacing Option 82 in the requests,
so that the DHCP clients can obtain IP addresses.