2-540
Cisco Catalyst Blade Switch 3120 for HP Command Reference
OL-12248-03
Chapter 2 Cisco Catalyst Blade Switch 3120 for HP Cisco IOS Commands
show ip dhcp snooping statistics
Table 2-28
shows the DHCP snooping statistics and their descriptions:
Table 2-28
DHCP Snooping Statistics
DHCP Snooping Statistic
Description
Packets Processed by DHCP Snooping
Total number of packets handled by DHCP
snooping, including forwarded and dropped
packets.
Packets Dropped Because IDB not known
Number of errors when the input interface of the
packet cannot be determined.
Queue full
Number of errors when an internal queue used to
process the packets is full. This might happen if
DHCP packets are received at an excessively high
rate and rate limiting is not enabled on the ingress
ports.
Interface is in errdisabled
Number of times a packet was received on a port
that has been marked as error disabled. This might
happen if packets are in the processing queue
when a port is put into the error-disabled state and
those packets are subsequently processed.
Rate limit exceeded
Number of times the rate limit configured on the
port was exceeded and the interface was put into
the error-disabled state.
Received on untrusted ports
Number of times a DHCP server packet (OFFER,
ACK, NAK, or LEASEQUERY) was received on
an untrusted port and was dropped.
Nonzero giaddr
Number of times the relay agent address field
(giaddr) in the DHCP packet received on an
untrusted port was not zero, or the
no ip dhcp
snooping information option allow-untrusted
global configuration command is not configured
and a packet received on an untrusted port
contained option-82 data.
Source mac not equal to chaddr
Number of times the client MAC address field of
the DHCP packet (chaddr) does not match the
packet source MAC address and the
ip dhcp
snooping verify mac-address
global
configuration command is configured.
Binding mismatch
Number of times a RELEASE or DECLINE
packet was received on a port that is different than
the port in the binding for that MAC
address-VLAN pair. This indicates someone
might be trying to spoof the real client, or it could
mean that the client has moved to another port on
the switch and issued a RELEASE or DECLINE.
The MAC address is taken from the chaddr field
of the DHCP packet, not the source MAC address
in the Ethernet header.