![HP HP ProCurve Series 6600 Access Security Manual Download Page 560](http://html.mh-extra.com/html/hp/hp-procurve-series-6600/hp-procurve-series-6600_access-security-manual_163101560.webp)
11-10
Configuring Advanced Threat Protection
DHCP Snooping
If DHCP snooping is enabled on a switch where an edge switch is also using
DHCP snooping, it is desirable to have the packets forwarded so the DHCP
bindings are learned. To configure the policy for DHCP packets from untrusted
ports that already have Option 82 present, enter this command in the global
configuration context.
N o t e
The default
drop
policy should remain in effect if there are any untrusted
nodes, such as clients, directly connected to this switch.
Syntax:
[no] dhcp-snooping option 82 [remote-id <mac | subnet-ip | mgmt-ip>]
[untrusted-policy <drop | keep | replace>]
Enables DHCP Option 82 insertion in the packet.
remote-id
Set the value used for the
remote-id
field of the
relay information option.
mac:
The switch mac address is used for the
remote-id. This is the default.
subnet-ip:
The IP address of the VLAN the packet
was received on is used for the remote-id. If
subnet-ip
is specified but the value is not set, the
MAC address is used.
mgmt-ip:
The management VLAN IP address is
used as the remote-id.
If
mgmt-ip
is specified but
the value is not set, the MAC address is used.
untrusted-
policy
Configures DHCP snooping behavior when
forwarding a DHCP packet from an untrusted
port that already contains DHCP relay informa-
tion (Option 82). The default is
drop
.
drop:
The packet is dropped.
keep:
The packet is forwarded without replacing
the option information.
replace:
The existing option is replaced with a
new Option 82 generated by the switch.
Summary of Contents for HP ProCurve Series 6600
Page 2: ......
Page 6: ...iv ...
Page 26: ...xxiv ...
Page 102: ...2 48 Configuring Username and Password Security Password Recovery ...
Page 204: ...4 72 Web and MAC Authentication Client Status ...
Page 550: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Page 612: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Page 734: ...14 44 Configuring and Monitoring Port Security Operating Notes for Port Security ...
Page 756: ...16 8 Key Management System Configuring Key Chain Management ...
Page 776: ...20 Index web server proxy 14 42 webagent access 6 6 wildcard See ACL wildcard See ACL ...
Page 777: ......