
DHCP Snooping Configuration
307
35.3
DHCP Snooping Typical Application
Fig 35-1 Sketch Map of TRUNK
As showed in the above chart, Mac-AA device is the normal user, connected to the
non-trusted port 1/0/1 of the switch. It operates via DHCP Client, IP 1.1.1.5; DHCP Server
and GateWay are connected to the trusted ports 1/0/11 and 1/0/12 of the switch; the
malicious user Mac-BB is connected to the non-trusted port 1/0/10, trying to fake a DHCP
Server
(
by sending DHCPACK
)
. Setting DHCP Snooping on the switch will effectively
detect and block this kind of network attack.
Configuration sequence is:
switch#
switch#config
switch(config)#ip dhcp snooping enable
switch(config)#interface ethernet 1/0/11
switch(Config-Ethernet1/0/11)#ip dhcp snooping trust
switch(Config-Ethernet1/0/11)#exit
switch(config)#interface ethernet 1/0/12
switch(Config-Ethernet1/0/12)#ip dhcp snooping trust
switch(Config-Ethernet1/0/12)#exit
switch(config)#interface ethernet 1/0/1-10
switch(Config-Port-Range)#ip dhcp snooping action shutdown
switch(Config-Port-Range)#
Содержание S63 series
Страница 445: ...Operational Configuration of AM Function 444 ...
Страница 535: ...RSPAN Configuration 534 VLAN for the TRUNK ports ...