353
Enable dynamic IPv4SG on Ten-GigabitEthernet 1/0/1 to filter received packets based on DHCP
snooping entries, allowing only packets from the client that obtains an IP address from the DHCP server
to pass.
Figure 107
Network diagram
Configuration procedure
1.
Configure the DHCP server.
For information about DHCP server configuration, see
Layer 3—IP Services Configuration Guide.
2.
Configure the switch:
# Configure IP addresses for the interfaces. (Details not shown.)
# Enable DHCP snooping.
<Switch> system-view
[Switch] dhcp snooping enable
# Configure Ten-GigabitEthernet 1/0/2 as a trusted interface.
[Switch] interface ten-gigabitethernet 1/0/2
[Switch-Ten-GigabitEthernet1/0/2] dhcp snooping trust
[Switch-Ten-GigabitEthernet1/0/2] quit
# Enable IPv4SG on Ten-GigabitEthernet 1/0/1 and verify the source IP address and MAC
address for dynamic IPSG.
[Switch] interface ten-gigabitethernet 1/0/1
[Switch-Ten-GigabitEthernet1/0/1] ip verify source ip-address mac-address
# Enable recording of client information in DHCP snooping entries on Ten-GigabitEthernet 1/0/1.
[Switch-Ten-GigabitEthernet1/0/1] dhcp snooping binding record
[Switch-Ten-GigabitEthernet1/0/1] quit
Verifying the configuration
# Verify that a dynamic IPv4SG binding is generated based on a DHCP snooping entry
[Switch] display ip source binding dhcp-snooping
Total entries found: 1
IP Address MAC Address Interface VLAN Type
192.168.0.1 0001-0203-0406 XGE1/0/1 1 DHCP snooping
Dynamic IPv4SG using DHCP relay configuration example
Network requirements
As shown in
, DHCP relay is enabled on the switch. The host obtains an IP address from the
DHCP server through the DHCP relay agent.
Enable dynamic IPv4SG on VLAN-interface 100 to filter received packets based on the DHCP relay entry
generated on the switch.