Chapter 26 IP Source Guard
GS1920v2 Series User’s Guide
244
26.6.1 DHC P Sno o ping Po rt C o nfig ure
Use this screen to specify whether ports are trusted or untrusted ports for DHCP snooping.
Note: If DHCP snooping is enabled but there are no trusted ports, DHCP requests cannot
reach the DHCP server.
You can also specify the maximum number for DHCP packets that each port (trusted or untrusted) can
receive each second. To open this screen, click
Adva nc e d Applic a tio n > IP So urc e G ua rd > IPv4 So urc e
G ua rd Se tup > DHC P Sno o ping > C o nfig ure > Po rt
.
Fig ure 173
Advanced Application > IP Source Guard > IPv4 Source Guard Setup > DHCP Snooping >
Configure > Port
Renew DHCP
Snooping URL
Enter the location of a DHCP snooping database, and click
Re ne w
if you want the
Switch to load it. You can use this to load dynamic bindings from a different DHCP
snooping database than the one specified in
Ag e nt URL
.
When the Switch loads dynamic bindings from a DHCP snooping database, it does not
discard the current dynamic bindings first. If there is a conflict, the Switch keeps the
dynamic binding in volatile memory and updates the
Binding c o llisio ns
counter in the
DHC P Sno o ping
screen (
Section 26.5 on page 239
).
Apply
Click
Apply
to save your changes to the Switch’s run-time memory. The Switch loses
these changes if it is turned off or loses power, so use the
Sa ve
link on the top
navigation panel to save your changes to the non-volatile memory when you are
done configuring.
Cancel
Click this to reset the values in this screen to their last-saved values.
Table 103 Advanced Application > IP Source Guard > IPv4 Source Guard Setup > DHCP Snooping >
Configure (continued) (continued)
LABEL
DESC RIPTIO N
Содержание GS1920-48HPv2
Страница 19: ...19 PA RT I Use r s Guide...
Страница 43: ...43 PA RT II T e c hnic al Re fe re nc e...
Страница 124: ...Chapter 9 VLAN GS1920v2 Series User s Guide 124 Figure 97 Advanced Application VLAN Port Based VLAN Setup Port Isolation...
Страница 155: ...Chapter 13 Spanning Tree Protocol GS1920v2 Series User s Guide 155 Figure 118 MSTP and Legacy RSTP Network Example...
Страница 193: ...GS1920v2 Series User s Guide 193 Figure 140 Classifier Example...
Страница 224: ...Chapter 24 Multicast GS1920v2 Series User s Guide 224 Figure 162 MVR Group Configuration Example 2 EXAMPLE...
Страница 367: ...Chapter 40 Access Control GS1920v2 Series User s Guide 367 Figure 271 Example Lock Denoting a Secure Connection EXAMPLE...
Страница 388: ...Chapter 48 Configure Clone GS1920v2 Series User s Guide 388 Figure 284 Management Configure Clone...