Tripp Lite NGI-M08C4POE8-2 Owner's Manual page 235

Sfp slots managed industrial ethernet poe+ switch
Table of Contents

Advertisement

table dynamically. This can prevent clients from getting IP addresses from unauthorized DHCP
servers.
Trusted vs. Untrusted Ports
Every port is either a trusted port or an un-trusted port for DHCP snooping. This setting is
independent of the trusted/un-trusted setting for ARP inspection. You can also specify the
maximum number for DHCP packets that each port (trusted or un-trusted) can receive each
second.
Trusted ports are connected to DHCP servers or other switches. The Switch discards DHCP
packets from trusted ports only if the rate at which DHCP packets arrive is too high. The Switch
learns dynamic bindings from trusted ports.
Note: The Switch will drop all DHCP requests if you enable DHCP snooping and there are no
trusted ports.
Untrusted ports are connected to subscribers. The Switch discards DHCP packets from un-
trusted ports in the following situations:
The packet is a DHCP server packet (for example, OFFER, ACK, or NACK).
The source MAC address and source IP address in the packet do not match any of the current
bindings.
The packet is a RELEASE or DECLINE packet, and the source MAC address and source
port do not match any of the current bindings.
The rate at which DHCP packets arrive is too high.
DHCP Snooping Database
The Switch stores the binding table in volatile memory. If the Switch restarts, it loads static
bindings from permanent memory but loses the dynamic bindings, in which case the devices in
the network have to send DHCP requests again.
Configuring DHCP Snooping
Follow these steps to configure DHCP snooping on the Switch.
1.
Enable DHCP snooping on the Switch.
2.
Enable DHCP snooping on each VLAN.
3.
Configure trusted and un-trusted ports.
4.
Configure static bindings.
Notes:
• The Switch will drop all DHCP requests if you enable DHCP snooping and there are
no trusted ports.
• If the port link down, the entries learned by this port in the DHCP snooping binding
table will be deleted.
• You must enable the global DHCP snooping and DHCP Snooping for vlan first.
The main purposes of the DHCP Snooping are:
1. Create and maintain binding table for ARP Inspection function.
2. Filter the DHCP server's packets that the DHCP server connects to an un-trusted port.
235

Advertisement

Table of Contents
loading

Table of Contents