3-2
Application Environment of Trusted Ports
Configuring a trusted port connected to a DHCP server
Figure 3-1
Configure trusted and untrusted ports
As shown in
Figure 3-1
, a DHCP snooping device’s port that is connected to an authorized DHCP
server should be configured as a trusted port to forward reply messages from the DHCP server, so that
the DHCP client can obtain an IP address from the authorized DHCP server.
Configuring trusted ports in a cascaded network
In a cascaded network involving multiple DHCP snooping devices, the ports connected to other DHCP
snooping devices should be configured as trusted ports.
To save system resources, you can disable the trusted ports, which are indirectly connected to DHCP
clients, from recording clients’ IP-to-MAC bindings upon receiving DHCP requests.
Figure 3-2
Configure trusted ports in a cascaded network
Table 3-1
describes roles of the ports shown in
Figure 3-2
.
Содержание 2928 - Baseline Plus Switch PWR
Страница 92: ...1 9 Figure 1 7 Display the rate settings of ports ...
Страница 105: ...1 4 Figure 1 3 Switch to the management level ...
Страница 106: ...i Table of Contents 1 Loopback Test Configuration 1 1 Overview 1 1 Loopback Operation 1 1 Configuration Guidelines 1 2 ...
Страница 109: ...i Table of Contents 1 VCT 1 1 Overview 1 1 Testing Cable Status 1 1 ...
Страница 114: ...1 2 Figure 1 2 Port traffic statistics ...
Страница 138: ...i Table of Contents 1 Energy Saving Configuration 1 1 Overview 1 1 Configuring Energy Saving on a Port 1 1 ...
Страница 159: ...i Table of Contents 1 Interface Statistics 1 1 Overview 1 1 Displaying Interface Statistics 1 1 ...
Страница 279: ...1 28 Figure 1 26 The Port Setup tab ...
Страница 331: ...i Table of Contents 1 Service Management 1 1 Overview 1 1 Configuring Service Management 1 2 ...