Ip dhcp snooping trust, Ip dhcp snooping trust -24, Ip dhcp snooping trust (23-24) – SMC Networks TigerAccess SMC7816M User Manual

Page 612

Advertising
background image

C

LIENT

S

ECURITY

C

OMMANDS

23-24

acknowledgement packets sent by the DHCP server in response to host
requests will be blocked by the switch.

Example
This example sets the client limit to its maximum value on port 5.

ip dhcp snooping trust

This command configures the specified interface as trusted. Use the no
form to restore the default setting.

Syntax

[no] ip dhcp snooping trust

Default Setting

All interfaces are untrusted

Command Mode

Interface Configuration (Ethernet, Port Channel)

Command Usage

• A trusted interface is an interface that is configured to receive only

messages from within the network. An untrusted interface is an
interface that is configured to receive messages from outside the
network or firewall.

• When DHCP snooping enabled globally using the ip dhcp snooping

command (page 23-18), and enabled on a VLAN with the ip dhcp
snooping vlan
c
ommand (page 23-18), DHCP packet filtering will be
performed on any untrusted ports within the VLAN according to the
default status, or as specifically configured for an interface with the no
ip dhcp snooping trust
command.

• When an untrusted port is changed to a trusted port, all the dynamic

DHCP snooping bindings associated with this port are removed.

Console(config)#interface ethernet 1/5
Console(config-if)#ip dhcp snooping client limit 48
Console(config-if)#

Advertising
This manual is related to the following products: