| General Security Measures
C
25
HAPTER
DHCP Snooping
ip dhcp snooping
trust
R
C
ELATED
OMMANDS
ip dhcp snooping (674)
ip dhcp snooping trust (680)
This command configures the specified interface as trusted. Use the no
form to restore the default setting.
S
YNTAX
[no] ip dhcp snooping trust
D
S
EFAULT
ETTING
All interfaces are untrusted
C
M
OMMAND
ODE
Interface Configuration (Ethernet, Port Channel)
C
U
OMMAND
SAGE
A trusted interface is an interface that is configured to receive only
◆
messages from within the network. An untrusted interface is an
interface that is configured to receive messages from outside the
network or fire wall.
◆
Set all ports connected to DHCP servers within the local network or fire
wall to trusted, and all other ports outside the local network or fire wall
to untrusted.
When DHCP snooping ia enabled globally using the
◆
command, and enabled on a VLAN with
command, DHCP packet filtering will be performed on any untrusted
ports within the VLAN according to the default status, or as specifically
configured for an interface with the no ip dhcp snooping trust
command.
◆
When an untrusted port is changed to a trusted port, all the dynamic
DHCP snooping bindings associated with this port are removed.
Additional considerations when the switch itself is a DHCP client – The
◆
port(s) through which it submits a client request to the DHCP server
must be configured as trusted.
E
XAMPLE
This example sets port 5 to untrusted.
Console(config)#interface ethernet 1/5
Console(config-if)#no ip dhcp snooping trust
Console(config-if)#
R
C
ELATED
OMMANDS
ip dhcp snooping (674)
ip dhcp snooping vlan (679)
– 680 –
ip dhcp snooping
ip dhcp snooping vlan