Configure System Information
100
Insight Managed 28-Port Gigabit Ethernet Smart Cloud Switch with 2 SFP 1G & 2 SFP+ 10G Fiber Ports
8.
Click the
Apply
button.
Your settings are saved.
Configure DHCP Snooping Interface Settings
You can view and configure each port as a trusted or untrusted port. Any DHCP responses
received on a trusted port are forwarded. If a port is configured as untrusted, any DHCP (or
BootP) responses received on that port are discarded.
To configure DHCP snooping interface settings:
1.
Connect your computer to the same network as the switch.
You can use a WiFi or wired connection to connect your computer to the network, or
connect directly to a switch that is off-network using an Ethernet cable.
2.
Launch a web browser.
3.
In the address field of your web browser, enter the IP address of the switch.
If you do not know the IP address of the switch, see
The login window opens.
4.
Enter the switch’s password in the
password
field.
The default password is
password
. If you added the switch to a network on the Insight
app before and you did not yet change the password through the local browser interface,
enter your Insight network password.
The System Information page displays.
5.
Select
System
> Services > DHCP Snooping > Interface Configuration
.
The DHCP Snooping Interface Configuration page displays.
6.
To display information for all ports and LAGs, click the
All
link.
7.
Select one or more interfaces by taking one of the following actions:
•
To configure a single interface, select the check box associated with the port, or type
the port number in the
Go To Interface
field and click the
Go
button.
•
To configure multiple interfaces with the same settings, select the check box
associated with each interface.
•
To configure all interfaces with the same settings, select the check box in the heading
row.
8.
From the
Trust Mode
menu, select the desired trust mode:
•
Disabled
. The interface is considered to be untrusted and could potentially be used to
launch a network attack. DHCP server messages are checked against the bindings
database. On untrusted ports, DHCP snooping enforces the following security rules:
-
DHCP packets from a DHCP server (DHCPOFFER, DHCPACK, DHCPNAK,
DHCPRELEASEQUERY) are dropped.