Snooping and Inspecting Traffic
783
How Is the DHCP Snooping Bindings Database Populated?
The DHCP snooping application uses DHCP messages to build and maintain
the binding’s database. DHCP snooping creates a tentative binding from
DHCP DISCOVER and REQUEST messages. Tentative bindings tie a client
to a port (the port where the DHCP client message was received). Tentative
bindings are completed when DHCP snooping learns the client’s IP address
from a DHCP ACK message on a trusted port. DHCP snooping removes
bindings in response to DECLINE, RELEASE, and NACK messages. The
DHCP snooping application ignores the ACK messages as a reply to the
DHCP Inform messages received on trusted ports. You can also enter static
bindings into the binding database.
When a switch learns of new bindings or loses bindings, the switch
immediately updates the entries in the database. The switch also updates the
entries in the binding file. The frequency at which the file is updated is based
on a configurable delay, and the updates are batched.
If the absolute lease time of the snooping database entry expires, that entry is
removed. Make sure the system time is consistent across the reboots.
Otherwise, the snooping entries will not expire properly. If a host sends a
DHCP release while the switch is rebooting, when the switch receives the
DHCP discovery or request, the client’s binding goes to the tentative binding
as shown in Figure 27-1.
Figure 27-1. DHCP Binding
The binding database includes data for clients only on untrusted ports.
Tentative
Binding
Complete
Binding
No Binding
ACK
Discover
Discover
Request
Release
NACK
Decline
NACK
Содержание PowerConnect 7024
Страница 134: ...134 Setting Basic Network Information ...
Страница 290: ...290 Managing General System Settings Figure 11 14 SNTP Servers Table ...
Страница 348: ...348 Configuring SNMP ...
Страница 430: ...430 Monitoring Switch Traffic ...
Страница 444: ...444 Configuring iSCSI Optimization ...
Страница 521: ...Configuring 802 1X and Port Based Security 521 Figure 19 8 Configure Port Security Settings 5 Click Apply ...
Страница 538: ...538 Configuring 802 1X and Port Based Security ...
Страница 585: ...Configuring VLANs 585 Figure 21 5 Add Ports to VLAN 4 Click Apply 5 Verify that the ports have been added to the VLAN ...
Страница 594: ...594 Configuring VLANs Figure 21 16 GVRP Port Parameters Table ...
Страница 600: ...600 Configuring VLANs Figure 21 23 Double VLAN Port Parameter Table ...
Страница 658: ...658 Configuring the Spanning Tree Protocol ...
Страница 693: ...Configuring Port Based Traffic Control 693 Figure 24 3 Storm Control 5 Click Apply ...
Страница 780: ...780 Configuring Connectivity Fault Management ...
Страница 804: ...804 Snooping and Inspecting Traffic Figure 27 17 DAI Interface Configuration Summary ...
Страница 818: ...818 Snooping and Inspecting Traffic ...
Страница 836: ...836 Configuring Link Aggregation ...
Страница 882: ...882 Configuring DHCP Server Settings ...
Страница 916: ...916 Configuring L2 and L3 Relay Features Figure 33 3 DHCP Relay Interface Summary ...
Страница 924: ...924 Configuring L2 and L3 Relay Features Figure 33 12 IP Helper Statistics ...
Страница 930: ...930 Configuring L2 and L3 Relay Features ...
Страница 1004: ...1004 Configuring OSPF and OSPFv3 ...
Страница 1044: ...1044 Configuring VRRP ...
Страница 1057: ...Configuring IPv6 Routing 1057 Figure 37 9 IPv6 Route Preferences ...
Страница 1064: ...1064 Configuring IPv6 Routing ...
Страница 1084: ...1084 Configuring DHCPv6 Server and Relay Settings ...
Страница 1091: ...Configuring Differentiated Services 1091 Figure 39 5 DiffServ Class Criteria ...
Страница 1114: ...1114 Configuring Differentiated Services ...
Страница 1130: ...1130 Configuring Class of Service ...
Страница 1136: ...1136 Configuring Auto VoIP ...
Страница 1216: ...1216 Managing IPv4 and IPv6 Multicast ...