Filtering the source IP address in a packet. If the source IP address and the number of the port that
receives the packet are consistent with entries in the DHCP-snooping table or static binding table,
the switch regards the packet as a valid packet and forwards it; otherwise, the switch drops it
directly.
Filtering the source IP address and the source MAC address in a packet. If the source IP address
and source MAC address in the packet, and the number of the port that receives the packet are
consistent with entries in the DHCP-snooping table or static binding table, the switch regards the
packet as a valid packet and forwards it; otherwise, the switch drops it directly.
DHCP Snooping Configuration
Configuring DHCP Snooping
Follow these steps to configure DHCP snooping:
Operation
Enter system view
Enable DHCP snooping
After DHCP snooping is enabled on a Switch 4210, clients connected with this switch cannot obtain IP
addresses dynamically through BOOTP.
Configuring DHCP Snooping Trusted/Untrusted Ports
Follow these steps to configure DHCP Snooping Trusted/Untrusted Ports:
Operation
Enter system view
Enter Ethernet port view
Specify the current port
as a trusted port
Command
system-view
dhcp-snooping
Command
system-view
interface interface-type
interface-number
dhcp-snooping trust
3-5
Description
—
Required
By default, the DHCP snooping function
is disabled.
Description
—
—
Required
By default, after DHCP snooping is
enabled, all ports of the switch are
untrusted ports.
Need help?
Do you have a question about the 4210 9-Port and is the answer not in the manual?
Questions and answers