Ip Dhcp Snooping Trust - Edge-Core ES3510MA-DC Management Manual

Layer 2 switch with 8 10/100base-tx rj-45 ports, and 2 gigabit combination ports rj-45/sfp
Table of Contents

Advertisement

| General Security Measures
C
25
HAPTER
DHCP Snooping
ip dhcp snooping
trust
R
C
ELATED
OMMANDS
ip dhcp snooping (674)

ip dhcp snooping trust (680)

This command configures the specified interface as trusted. Use the no
form to restore the default setting.
S
YNTAX
[no] ip dhcp snooping trust
D
S
EFAULT
ETTING
All interfaces are untrusted
C
M
OMMAND
ODE
Interface Configuration (Ethernet, Port Channel)
C
U
OMMAND
SAGE
A trusted interface is an interface that is configured to receive only
messages from within the network. An untrusted interface is an
interface that is configured to receive messages from outside the
network or fire wall.
Set all ports connected to DHCP servers within the local network or fire
wall to trusted, and all other ports outside the local network or fire wall
to untrusted.
When DHCP snooping ia enabled globally using the
command, and enabled on a VLAN with
command, DHCP packet filtering will be performed on any untrusted
ports within the VLAN according to the default status, or as specifically
configured for an interface with the no ip dhcp snooping trust
command.
When an untrusted port is changed to a trusted port, all the dynamic
DHCP snooping bindings associated with this port are removed.
Additional considerations when the switch itself is a DHCP client – The
port(s) through which it submits a client request to the DHCP server
must be configured as trusted.
E
XAMPLE
This example sets port 5 to untrusted.
Console(config)#interface ethernet 1/5
Console(config-if)#no ip dhcp snooping trust
Console(config-if)#
R
C
ELATED
OMMANDS
ip dhcp snooping (674)
ip dhcp snooping vlan (679)
– 680 –
ip dhcp snooping
ip dhcp snooping vlan

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents