11-4
Configuring Advanced Threat Protection
DHCP Snooping
Overview
You can use DHCP snooping to help avoid the Denial of Service attacks that
result from unauthorized users adding a DHCP server to the network that then
provides invalid configuration data to other DHCP clients on the network.
DHCP snooping accomplishes this by allowing you to distinguish between
trusted ports connected to a DHCP server or switch and untrusted ports
connected to end-users. DHCP packets are forwarded between trusted ports
without inspection. DHCP packets received on other switch ports are
inspected before being forwarded. Packets from untrusted sources are
dropped. Conditions for dropping packets are shown below.
Condition for Dropping a Packet
Packet Types
A packet from a DHCP server received on an untrusted port
DHCPOFFER, DHCPACK,
DHCPNACK
If the switch is configured with a list of authorized DHCP
server addresses and a packet is received from a DHCP
server on a trusted port with a source IP address that is not
in the list of authorized DHCP server addresses.
DHCPOFFER, DHCPACK,
DHCPNACK
Unless configured to not perform this check, a DHCP packet
received on an untrusted port where the DHCP client
hardware address field does not match the source MAC
address in the packet
N/A
Unless configured to not perform this check, a DHCP packet
containing DHCP relay information (option 82) received from
an untrusted port
N/A
A broadcast packet that has a MAC address in the DHCP
binding database, but the port in the DHCP binding database
is different from the port on which the packet is received
DHCPRELEASE,
DHCPDECLINE
Summary of Contents for HP ProCurve Series 6600
Page 2: ......
Page 6: ...iv ...
Page 26: ...xxiv ...
Page 102: ...2 48 Configuring Username and Password Security Password Recovery ...
Page 204: ...4 72 Web and MAC Authentication Client Status ...
Page 550: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Page 612: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Page 734: ...14 44 Configuring and Monitoring Port Security Operating Notes for Port Security ...
Page 756: ...16 8 Key Management System Configuring Key Chain Management ...
Page 776: ...20 Index web server proxy 14 42 webagent access 6 6 wildcard See ACL wildcard See ACL ...
Page 777: ......