Dhcp Snooping Configuration; Dhcp Snooping Overview; Functions Of Dhcp Snooping - HP A5120 EI Series Configuration Manual

Hide thumbs Also See for A5120 EI Series:
Table of Contents

Advertisement

DHCP snooping configuration

NOTE:
The DHCP snooping-enabled device must be either between the DHCP client and relay agent, or
between the DHCP client and server. It does not work if it is between the DHCP relay agent and DHCP
server.

DHCP snooping overview

Functions of DHCP snooping

DHCP snooping is a security feature with the following uses:
Ensure that DHCP clients obtain IP addresses from authorized DHCP servers.
1.
Record IP-to-MAC mappings of DHCP clients.
2.
Ensuring that DHCP clients obtain IP addresses from authorized DHCP servers
With DHCP snooping, the ports of a switch can be configured as trusted or untrusted to ensure that client
obtain IP address only from authorized DHCP servers.
Trusted: A trusted port forwards DHCP messages normally to ensure the clients get IP addresses from
an authorized DHCP server.
Untrusted: An untrusted port discards received DHCP-ACK and DHCP-OFFER messages to avoid IP
address allocation from any unauthorized server.
Configure ports that connect to authorized DHCP servers or other DHCP snooping devices as trusted, and
configure other ports as untrusted.
Recording IP-to-MAC mappings of DHCP clients
DHCP snooping reads DHCP-REQUEST messages and DHCP-ACK messages from trusted ports to record
DHCP snooping entries. A DHCP snooping entry includes the MAC and IP addresses of the clients, the
port that connects to DHCP clients, and the VLAN of the port. Using DHCP snooping entries, DHCP
snooping can implement the following functions:
ARP detection: Whether ARP packets are sent from an authorized client is determined based on
DHCP snooping entries. This feature prevents ARP attacks from unauthorized clients. For more
information, see the Security Configuration Guide.
IP source guard: IP source guard uses dynamic binding entries generated by DHCP snooping to filter
packets on a per-port basis. This prevents unauthorized packets from traveling through. For more
information, see the Security Configuration Guide.
65

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents