11-9
Configuring Advanced Threat Protection
DHCP Snooping
If DHCP snooping is enabled on a switch where an edge switch is also using
DHCP snooping, it is desirable to have the packets forwarded so the DHCP
bindings are learned. To configure the policy for DHCP packets from untrusted
ports that already have Option 82 present, enter this command in the global
configuration context.
N o t e
The default
drop
policy should remain in effect if there are any untrusted
nodes, such as clients, directly connected to this switch.
Syntax:
[no] dhcp-snooping option 82 [remote-id <mac | subnet-ip | mgmt-ip>]
[untrusted-policy <drop | keep | replace>]
Enables DHCP Option 82 insertion in the packet.
remote-id
Set the value used for the
remote-id
field of the
relay information option.
mac:
The switch mac address is used for the
remote-id. This is the default.
subnet-ip:
The IP address of the VLAN the packet
was received on is used for the remote-id. If
subnet-ip
is specified but the value is not set, the
MAC address is used.
mgmt-ip:
The management VLAN IP address is
used as the remote-id.
If
mgmt-ip
is specified but
the value is not set, the MAC address is used.
untrusted-
policy
Configures DHCP snooping behavior when
forwarding a DHCP packet from an untrusted
port that already contains DHCP relay informa-
tion (Option 82). The default is
drop
.
drop:
The packet is dropped.
keep:
The packet is forwarded without replacing
the option information.
replace:
The existing option is replaced with a
new Option 82 generated by the switch.
Содержание E3800 Series
Страница 1: ...HP Switch Software E3800 switches Software version KA 15 03 September 2011 Access Security Guide ...
Страница 2: ......
Страница 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Страница 30: ...xxviii ...
Страница 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Страница 186: ...4 72 Web and MAC Authentication Client Status ...
Страница 290: ...6 74 RADIUS Authentication Authorization and Accounting Dynamic Removal of Authentication Limits ...
Страница 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Страница 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Страница 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Страница 659: ...14 11 Configuring and Monitoring Port Security Port Security Figure 14 5 Examples of Show Mac Address Outputs ...
Страница 730: ...20 Index ...
Страница 731: ......