![Cisco 350XG series Скачать руководство пользователя страница 334](http://html.mh-extra.com/html/cisco/350xg-series/350xg-series_administration-manual_67491334.webp)
IP Configuration
IPv4 Management and Interfaces
Cisco 350XG & 550XG Series 10G Stackable Managed Switches
323
16
The DHCP Snooping Binding database is also used by IP Source Guard and
Dynamic ARP Inspection features to determine legitimate packet sources.
DHCP Trusted Ports
Ports can be either DHCP trusted or untrusted. By default, all ports are untrusted.
To create a port as trusted, use the
page. Packets from these
ports are automatically forwarded. Packets from trusted ports are used to create
the Binding database and are handled as described below.
If DHCP Snooping is not enabled, all ports are trusted by default.
How the DHCP Snooping Binding Database is Built
The following describes how the device handles DHCP packets when both the
DHCP client and DHCP server are trusted. The DHCP Snooping Binding database
is built in this process.
DHCP Trusted Packet Handling
The actions are:
STEP 1
Device sends DHCPDISCOVER to request an IP address or DHCPREQUEST to
accept an IP address and lease.
STEP 2
Device snoops packet and adds the IP-MAC information to the DHCP Snooping
Binding database.
STEP 3
Device forwards DHCPDISCOVER or DHCPREQUEST packets.
STEP 4
DHCP server sends DHCPOFFER packet to offer an IP address, DHCPACK to
assign one, or DHCPNAK to deny the address request.
STEP 5
Device snoops packet. If an entry exists in the DHCP Snooping Binding table that
matches the packet, the device replaces it with IP-MAC binding on receipt of
DHCPACK.