H3C S3100 Series Operation Manual page 497

H3c s3100 series ethernet switches operation manual
Hide thumbs Also See for S3100 Series:
Table of Contents

Advertisement

Introduction to DHCP Accounting··································································································2-23
DHCP Accounting Fundamentals··································································································2-23
DHCP Accounting Configuration ···································································································2-24
Displaying and Maintaining the DHCP Server ······················································································2-25
DHCP Server Configuration Examples ·································································································2-26
DHCP Server Configuration Example ···························································································2-26
DHCP Server with Option 184 Support Configuration Example ···················································2-28
DHCP Accounting Configuration Example ····················································································2-29
Troubleshooting a DHCP Server ··········································································································2-31
3 DHCP Snooping Configuration ················································································································3-1
Introduction ·············································································································································3-1
Introduction to DHCP Snooping ······································································································3-1
Introduction to DHCP Snooping Trusted/Untrusted Ports·······························································3-1
Introduction to Unauthorized DHCP Server Detection ····································································3-2
Overview of IP Filtering ···················································································································3-5
DHCP Snooping Configuration ···············································································································3-6
Configuring DHCP Snooping···········································································································3-6
Configuring DHCP Snooping Trusted/Untrusted Ports ···································································3-6
Configuring Unauthorized DHCP Server Detection ················································································3-7
Configuring DHCP Snooping to Support Option 82 ········································································3-7
Configuring IP Filtering ··················································································································3-11
Displaying DHCP Snooping Configuration····························································································3-12
DHCP Snooping Configuration Example ······························································································3-13
DHCP-Snooping Option 82 Support Configuration Example ························································3-13
Unauthorized DHCP Server Detection Configuration Example ····················································3-14
IP Filtering Configuration Example································································································3-15
4 DHCP Packet Rate Limit Configuration···································································································4-1
Introduction to DHCP Packet Rate Limit·································································································4-1
Configuring DHCP Packet Rate Limit ·····································································································4-2
Configuring DHCP Packet Rate Limit······························································································4-2
Rate Limit Configuration Example ··········································································································4-2
5 DHCP/BOOTP Client Configuration ·········································································································5-1
Introduction to DHCP Client····················································································································5-1
Introduction to Automatic Configuration··································································································5-1
Application Background···················································································································5-1
How Automatic Configuration Works·······························································································5-2
Introduction to BOOTP Client ·················································································································5-3
Configuring a DHCP/BOOTP Client········································································································5-4
DHCP Client Configuration Example ······································································································5-5
Displaying DHCP/BOOTP Client Configuration······················································································5-5
ii

Advertisement

Chapters

Table of Contents
loading

Table of Contents