201
3-17-2. DHCP Snooping Entry
Function name:
DHCP Snooping Entry
Function description:
DHCP snooping Entry allows a switch to add the trust DHCP server and 2
trust ports to build the DHCP snooping available entry. This information can be
useful in tracking an IP address back to a physical port and enable or disable
the DHCP Option 82.
Fig. 3-17-1 DHCP Snooping State
Parameter description:
VID
:
When DHCP snooping is enabled, and enabled on the specified
VLAN, DHCP packet filtering will be performed on any un-trusted
ports within the VLAN. It set an available VLAN ID to enable the
DHCP snooping on VLAN interface.
Trust Port 1
:
If DHCP snooping is enabled globally, and also enabled on
the VLAN where the DHCP packet is received, all DHCP packets are
forwarded for a trusted port. It set a trust port 1. available port from 0
to 24. 0 is disabled.
Trust port 2:
It set a trust port 2. available port from 0 to 24. 0 is disabled.
Trust VID
:
It set a trust VLAN ID. available VID from 1 to 4094.
Server IP
:
It set a trust DHCP Server IP address for DHCP Snooping.
Option 82
:
It set the DHCP Option 82 function on the switch, default is
Disable.
Action
:
It set the switch when received a client DHCP request packet then
action for filtering. available action : keep/ drop / replace.
Note
:
Filtering rules are implemented as follows:
-
If the DHCP snooping is disabled, all DHCP packets are forwarded.
-
If DHCP snooping is enabled and also enabled on the VLAN where
the DHCP packet is received, all DHCP packets are forwarded for a
trusted port.
-
If DHCP snooping is enabled and also enabled on the VLAN where
the DHCP packet is received, but the port is not trusted, it is
Summary of Contents for KGS-2416
Page 2: ......
Page 4: ......
Page 34: ...30 Fig 2 15 Office Network Connection Fig 2 14 Peer to peer Network Connection ...
Page 93: ...89 Fig 3 39 Fig 3 40 Fig 3 41 ...
Page 109: ...105 Fig 3 62 Set up VLAN Tag Priority Mapping Finish ...
Page 116: ...112 Fig 3 67 Ingress Port Fig 3 68 ...
Page 118: ...114 Fig 3 71 Fig 3 72 Fig 3 73 ARP ...
Page 119: ...115 Fig 3 74 ARP Fig 3 75 ARP Fig 3 76 ARP Fig 3 77 ARP ...
Page 120: ...116 Fig 3 78 ARP Fig 3 79 ARP Fig 3 80 ARP Fig 3 81 ARP ...
Page 121: ...117 Fig 3 82 ARP Fig 3 83 ARP Fig 3 84 ARP Fig 3 85 ARP Fig 3 86 ARP ...
Page 122: ...118 Fig 3 87 IPv4 Fig 3 88 IPv4 Fig 3 89 IPv4 ...
Page 123: ...119 Fig 3 90 IPv4 Fig 3 91 IPv4 Fig 3 92 IPv4 Fig 3 93 IPv4 Fig 3 94 IPv4 ...
Page 124: ...120 Fig 3 95 IPv4 Fig 3 96 IPv4 Fig 3 97 IPv4 Fig 3 98 IPv4 Fig 3 99 IPv4 ...
Page 125: ...121 Fig 3 100 IPv4 Fig 3 101 IPv4 Fig 3 102 IPv4 ...
Page 126: ...122 Fig 3 103 IPv4 Fig 3 104 IPv4 Fig 3 105 IPv4 ...
Page 127: ...123 Fig 3 106 IPv4 Fig 3 107 IPv4 Fig 3 108 IPv4 ...
Page 128: ...124 Fig 3 109 IPv4 Fig 3 110 IPv4 Fig 3 111 IPv4 ...
Page 129: ...125 Fig 3 112 IPv4 Fig 3 113 IPv4 Fig 3 114 IPv4 ...
Page 130: ...126 Fig 3 115 IPv4 Fig 3 116 IPv4 Fig 3 117 Action ...
Page 131: ...127 Fig 3 118 Rate Limiter Fig 3 119 Port Copy ...
Page 132: ...128 Fig 3 120 DMAC Filter Fig 3 121 VLAN ID Filter Fig 3 122 VLAN ID Filter ...
Page 144: ...140 Fig 3 124 Wizard Fig 3 125 Set up Policy Rules Fig 3 126 Set up Policy Rules ...
Page 146: ...142 Fig 3 130 Set up Port Policies Fig 3 131 Set up Port Policies ...
Page 147: ...143 Fig 3 132 Set up Port Policies Finish Fig 3 133 Set up Typical Network Application Rules ...
Page 222: ...218 Fig 4 1 Fig 4 2 ...