159
Table 8 Handling strategies
If a DHCP request
has…
Handling
strategy
DHCP snooping…
Option 82
Drop
Drops the message.
Keep
Forwards the message without changing Option 82.
Replace
Forwards the message after replacing the original Option 82 with
the Option 82 padded according to the configured padding format,
padding content, and code type.
No Option 82
N/A
Forwards the message after adding the Option 82 padded
according to the configured padding format, padding content, and
code type.
Restrictions and guidelines: DHCP snooping
configuration
•
The DHCP snooping configuration does not take effect on a Layer 2 Ethernet interface that is
an aggregation member port. The configuration takes effect when the interface leaves the
aggregation group.
•
Specify the ports connected to authorized DHCP servers as trusted ports to make sure that
DHCP clients can obtain valid IP addresses. The trusted ports and the ports connected to
DHCP clients must be in the same VLAN.
•
You can specify the following interfaces as trusted ports: Layer 2 Ethernet interfaces, Layer 2
aggregate interfaces, Layer 3 Ethernet interfaces, and Layer 3 aggregate interfaces. For more
information about aggregate interfaces, see
Layer 2—LAN Switching Configuration Guide
.
DHCP snooping tasks at a glance
Tasks at a glance
(Required.)
Configuring basic DHCP snooping
(Optional.)
(Optional.)
Configuring DHCP snooping entry auto backup
(Optional.)
Enabling DHCP starvation attack protection
(Optional.)
Enabling DHCP-REQUEST attack protection
(Optional.)
Setting the maximum number of DHCP snooping entries
(Optional.)
Configuring a DHCP packet blocking port
(Optional.)
Enabling DHCP snooping logging
Configuring basic DHCP snooping
Step Command
Remarks
1.
Enter system view.
system-view
N/A