Dhcp-Snooping Trust - H3C s3100 series Command Manual

Hide thumbs Also See for s3100 series:
Table of Contents

Advertisement

Use the undo dhcp-snooping server-guard source-mac command to restore the default MAC
address.
By default, the source MAC address of DHCP-DISCOVER messages is the bridge MAC address of the
switch.
Note that among S3100 series switches, only S3100-SI series switches support the two commands.
Examples
# Specify the source MAC address for DHCP-DISCOVER messages as 000f-e200-3100.
<Sysname> system-view
System View: return to User View with Ctrl+Z.
[Sysname] dhcp-snooping server-guard source-mac 000f-e200-3100

dhcp-snooping trust

Syntax
dhcp-snooping trust
undo dhcp-snooping trust
View
Ethernet port view
Parameters
None
Description
Use the dhcp-snooping trust command to set an Ethernet port to a DHCP-snooping trusted port.
Use the undo dhcp-snooping trust command to restore an Ethernet port to a DHCP-snooping
untrusted port.
By default, with the DHCP snooping enabled, all the ports of a switch are untrusted ports.
Note that:
Among S3100 series switches, only S3100-EI series switches support the two commands.
After DHCP snooping is enabled, you need to specify the port connected to a valid DHCP server as
trusted to ensure that DHCP clients can obtain valid IP addresses. The trusted port and the ports
connected to DHCP clients must be in the same VLAN.
Related commands: display dhcp-snooping trust.
Examples
# Enter system view.
<Sysname> system-view
System View: return to User View with Ctrl+Z.
# Set the Ethernet 1/0/1 port to a trusted port.
[Sysname] interface Ethernet1/0/1
[Sysname-Ethernet1/0/1] dhcp-snooping trust
2-9

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents