DHCP Snooping 3

the packet will only be forwarded if the client’s hardware address stored in the DHCP packet is the same as the source MAC address in the Ethernet header.

• If the DHCP packet is not a recognizable type, it is dropped.

If a DHCP packet from a client passes the filtering criteria above, it will only be forwarded to trusted ports in the same VLAN.

If a DHCP packet is from server is received on a trusted port, it will be forwarded to both trusted and untrusted ports in the same VLAN.

If the DHCP snooping is globally disabled, all dynamic bindings are removed from the binding table.

Additional considerations when the switch itself is a DHCP client – The port(s) through which the switch submits a client request to the DHCP server must be configured as trusted. Note that the switch will not add a dynamic entry for itself to the binding table when it receives an ACK message from a DHCP server. Also, when the switch sends out DHCP client packets for itself, no filtering takes place. However, when the switch receives any messages from a DHCP server, any packets received from untrusted ports are dropped.

DHCP Snooping Configuration

Command Attributes

DHCP Snooping Status – Enables or disables DHCP snooping globally.

DHCP Snooping MAC-Address Verification – Enables or disables MAC address verification. DHCP packets will be dropped if the source MAC address in the Ethernet header of the packet is not same as the client’s hardware address in the DHCP packet.

Web – Click DHCP Snooping, Configuration.

Figure 3-114 DHCP Snooping Configuration

CLI – This example first enables DHCP Snooping, and then enables DHCP Snooping MAC-Address Verification.

Console(config)#ip dhcp snooping

4-231

Console(config)#ip dhcp snooping verify mac-address

4-235

Console(config)#

 

3-187

Page 231
Image 231
SMC Networks SMC8150L2 manual Dhcp Snooping Configuration, Web Click Dhcp Snooping, Configuration