Ip Dhcp Snooping Information Option Allow-Untrusted - Cisco Catalyst 2950 Command Reference Manual

Hide thumbs Also See for Catalyst 2950:
Table of Contents

Advertisement

ip dhcp snooping information option allow-untrusted

ip dhcp snooping information option allow-untrusted
Use the ip dhcp snooping information option allow-untrusted global configuration command on an
aggregation switch to configure it to accept DHCP packets with option-82 information that are received
on untrusted ports that might be connected to an edge switch. Use the no form of this command to
configure the switch to drop these packets from the edge switch.
Syntax Description
This command has no arguments or keywords.
Defaults
The switch drops DHCP packets with option-82 information that are received on untrusted ports that
might be connected to an edge switch.
Command Modes
Global configuration
Command History
Release
12.1(22)EA3
Usage Guidelines
You might want an edge switch to which a host is connected to insert DHCP option-82 information at
the edge of your network. You might also want to enable DHCP security features, such as DHCP
snooping, IP source guard, or dynamic Address Resolution Protocol (ARP) inspection, on an
aggregation switch. However, if DHCP snooping is enabled on the aggregation switch, the switch drops
packets with option-82 information that are received on an untrusted port and does not learn DHCP
snooping bindings for connected devices on a trusted interface.
If the edge switch to which a host is connected inserts option-82 information and you want to use DHCP
snooping on an aggregation switch, enter the ip dhcp snooping information option allow-untrusted
command on the aggregation switch. The aggregation switch can learn the bindings for a host even
though the aggregation switch receives DHCP snooping packets on an untrusted port. You can also
enable DHCP security features on the aggregation switch. The port on the edge switch to which the
aggregation switch is connected must be configured as a trusted port.
Do not enter the ip dhcp snooping information option allow-untrusted command on an aggregation
Note
switch to which an untrusted device is connected. If you enter this command, an untrusted device might
spoof the option-82 information.
Examples
This example shows how to configure an access switch to not check the option-82 information in
untrusted packets from an edge switch and to accept the packets:
Switch(config)# ip dhcp snooping information option allow-untrusted
Catalyst 2950 and Catalyst 2955 Switch Command Reference
2-136
ip dhcp snooping information option allow-untrusted
no ip dhcp snooping information option allow-untrusted
Modification
This command was introduced.
Chapter 2
Catalyst 2950 and 2955 Cisco IOS Commands
OL-10102-01

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Catalyst 2955

Table of Contents