Ip Dhcp Snooping Trust; Ip Dhcp Snooping Mac-Verify - TP-Link JetStream T3700G-28TQ Reference Manual

Jetstream 28-port gigabit stackable l3 managed switch
Hide thumbs Also See for JetStream T3700G-28TQ:
Table of Contents

Advertisement

T3700G-28TQ
JetStream 28-Port Gigabit Stackable L3 Managed Switch CLI Guide

ip dhcp snooping trust

Description
The ip dhcp snooping trust command is used to configure a port to be a
Trusted Port. Only the Trusted Port can receive the DHCP packets from DHCP
servers. To turn the port back to a distrusted port, please use no ip dhcp
snooping trust command.
Syntax
ip dhcp snooping trust
no ip dhcp snooping trust
Command Mode
Interface Configuration Mode (interface fastEthernet / interface range
fastEthernet / interface gigabitEthernet / interface range gigabitEthernet/
interface ten-gigabitEthernet / interface range ten-gigabitEthernet)
Example
Configure the Gigabit Ethernet port 1/0/2 to be a Trusted Port:
T3700G-28TQ(config)#interface gigabitEthernet 1/0/2
T3700G-28TQ(config-if)#ip dhcp snooping trust

ip dhcp snooping mac-verify

Description
The ip dhcp snooping mac-verify command is used to enable the MAC Verify
feature. To disable the MAC Verify feature, please use no ip dhcp snooping
mac-verify command. There are two fields of the DHCP packet containing the
MAC address of the Host. The MAC Verify feature is to compare the two fields
and discard the packet if the two fields are different.
Syntax
ip dhcp snooping mac-verify
no ip dhcp snooping mac-verify
86

Advertisement

Table of Contents
loading

Table of Contents