Dhcp Snooping - Dell PowerConnect M6348 Configuration Manual

Configuration guide
Hide thumbs Also See for PowerConnect M6348:
Table of Contents

Advertisement

DHCP Snooping

Dynamic Host Configuration Protocol (DHCP) Snooping is a security feature that monitors DHCP
messages between a DHCP client and DHCP server to:
Filter harmful DHCP messages
Build a bindings database of (MAC address, IP address, VLAN ID, port) authorized tuples.
DHCP snooping is disabled globally and on all VLANs by default. Ports are untrusted by default.
Network administrators can enable DHCP snooping globally and on specific VLANs. They can also
configure ports within the VLAN to be trusted or untrusted. DHCP servers must be reached through
trusted ports.
DHCP snooping enforces the following security rules:
DHCP packets from a DHCP server (DHCPOFFER, DHCPACK, DHCPNAK,
DHCPRELEASEQUERY) are dropped if received on an untrusted port.
DHCPRELEASE and DHCPDECLINE messages are dropped if for a MAC addresses in the snooping
database, but the binding's interface is other than the interface where the message was received.
On untrusted interfaces, the switch drops DHCP packets with a source MAC address that does not
match the client hardware address. This is a configurable option.
Dynamic ARP Inspection uses the DHCP snooping bindings database to validate ARP packets.
To prevent DHCP packets being used as a DoS attack when DHCP snooping is enabled, the snooping
application enforces a rate limit for DHCP packets received on interfaces. DHCP snooping monitors the
receive rate on each interface separately. If the receive rate exceeds a configurable limit, DHCP snooping
brings down the interface. The user must do "no shutdown" on this interface to further work with that
port. The user can configure both the rate and the burst interval.
The hardware rate limits DHCP packets sent to the CPU from interfaces to 64 kbps.
The DHCP snooping application processes incoming DHCP messages. For DHCPRELEASE and
DHCPDECLINE messages, the application compares the receive interface and VLAN with the client
interface and VLAN in the bindings database. If the interfaces do not match, the application logs the
event and drops the message. For valid client messages, DHCP snooping compares the source MAC
address to the DHCP client hardware address. When there is a mismatch, DHCP snooping logs and
drops the packet. The network administrator can disable this feature using the no ip dhcp snooping
verify mac-address command. DHCP snooping forwards valid client messages on trusted members
within the VLAN. If DHCP relay co-exists with DHCP snooping, DHCP client messages are sent to
DHCP relay for further processing.
The DHCP snooping application uses DHCP messages to build and maintain the binding's database.
The binding's database only includes data for clients on untrusted ports. DHCP snooping creates a
tentative binding from DHCP DISCOVER and REQUEST messages. Tentative bindings tie a client to a
port (the port where the DHCP client message was received). Tentative bindings are completed when
DHCP snooping learns the client's IP address from a DHCP ACK message on a trusted port. DHCP
44
Switching Configuration

Advertisement

Table of Contents
loading

Table of Contents