Chapter 9
| General Security Measures
DHCPv4 Snooping
– 285 –
Command Usage
◆
A trusted interface is an interface that is configured to receive only
messages from within the network. An untrusted interface is an interface
that is configured to receive messages from outside the network or fire
wall.
◆
Set all ports connected to DHCP servers within the local network or fire
wall to trusted, and all other ports outside the local network or fire wall to
untrusted.
◆
When DHCP snooping is enabled globally using the
command, and enabled on a VLAN with
DHCP packet filtering will be performed on any untrusted ports within the
VLAN according to the default status, or as specifically configured for an
interface with the
no ip dhcp snooping trust
command.
◆
When an untrusted port is changed to a trusted port, all the dynamic
DHCP snooping bindings associated with this port are removed.
◆
Additional considerations when the switch itself is a DHCP client
– The
port(s) through which it submits a client request to the DHCP server must
be configured as trusted.
Example
This example sets port 5 to untrusted.
Console(config)#interface ethernet 1/5
Console(config-if)#no ip dhcp snooping trust
Console(config-if)#
ip dhcp snooping
max-number
This command configures the maximum number of DHCP clients which can
be supported per interface. Use the
no
form to restore the default setting.
Syntax
ip dhcp snooping max-number
max-number
no dhcp snooping max-number
max-number
- Maximum number of DHCP clients. (Range: 1-32)