H3C Technologies H3C S3100 Series Switches User Manual

Page 497

Advertising
background image

ii

Introduction to DHCP Accounting··································································································2-23

DHCP Accounting Fundamentals··································································································2-23

DHCP Accounting Configuration ···································································································2-24

Enabling the DHCP Server to Process Option 82 ················································································2-24

Displaying and Maintaining the DHCP Server ······················································································2-25

DHCP Server Configuration Examples ·································································································2-26

DHCP Server Configuration Example ···························································································2-26

DHCP Server with Option 184 Support Configuration Example ···················································2-28

DHCP Accounting Configuration Example ····················································································2-29

Troubleshooting a DHCP Server ··········································································································2-31

3 DHCP Snooping Configuration ················································································································3-1

Introduction ·············································································································································3-1

Introduction to DHCP Snooping ······································································································3-1

Introduction to DHCP Snooping Trusted/Untrusted Ports·······························································3-1

Introduction to Unauthorized DHCP Server Detection ····································································3-2

Overview of DHCP-Snooping Option 82 ·························································································3-2

Overview of IP Filtering ···················································································································3-5

DHCP Snooping Configuration ···············································································································3-6

Configuring DHCP Snooping···········································································································3-6

Configuring DHCP Snooping Trusted/Untrusted Ports ···································································3-6

Configuring Unauthorized DHCP Server Detection ················································································3-7

Configuring DHCP Snooping to Support Option 82 ········································································3-7

Configuring IP Filtering ··················································································································3-11

Displaying DHCP Snooping Configuration····························································································3-12

DHCP Snooping Configuration Example ······························································································3-13

DHCP-Snooping Option 82 Support Configuration Example ························································3-13

Unauthorized DHCP Server Detection Configuration Example ····················································3-14

IP Filtering Configuration Example································································································3-15

4 DHCP Packet Rate Limit Configuration···································································································4-1

Introduction to DHCP Packet Rate Limit·································································································4-1

Configuring DHCP Packet Rate Limit ·····································································································4-2

Configuring DHCP Packet Rate Limit······························································································4-2

Rate Limit Configuration Example ··········································································································4-2

5 DHCP/BOOTP Client Configuration ·········································································································5-1

Introduction to DHCP Client ····················································································································5-1

Introduction to Automatic Configuration··································································································5-1

Application Background···················································································································5-1

How Automatic Configuration Works·······························································································5-2

Introduction to BOOTP Client ·················································································································5-3

Configuring a DHCP/BOOTP Client········································································································5-4

DHCP Client Configuration Example ······································································································5-5

Displaying DHCP/BOOTP Client Configuration ······················································································5-5

Advertising