Dell POWEREDGE M1000E User Manual

Page 570

Advertising
background image

2-540

Cisco Catalyst Blade Switch 3120 for HP Command Reference

OL-12248-03

Chapter 2 Cisco Catalyst Blade Switch 3120 for HP Cisco IOS Commands

show ip dhcp snooping statistics

Table 2-28

shows the DHCP snooping statistics and their descriptions:

Table 2-28

DHCP Snooping Statistics

DHCP Snooping Statistic

Description

Packets Processed by DHCP Snooping

Total number of packets handled by DHCP
snooping, including forwarded and dropped
packets.

Packets Dropped Because IDB not known

Number of errors when the input interface of the
packet cannot be determined.

Queue full

Number of errors when an internal queue used to
process the packets is full. This might happen if
DHCP packets are received at an excessively high
rate and rate limiting is not enabled on the ingress
ports.

Interface is in errdisabled

Number of times a packet was received on a port
that has been marked as error disabled. This might
happen if packets are in the processing queue
when a port is put into the error-disabled state and
those packets are subsequently processed.

Rate limit exceeded

Number of times the rate limit configured on the
port was exceeded and the interface was put into
the error-disabled state.

Received on untrusted ports

Number of times a DHCP server packet (OFFER,
ACK, NAK, or LEASEQUERY) was received on
an untrusted port and was dropped.

Nonzero giaddr

Number of times the relay agent address field
(giaddr) in the DHCP packet received on an
untrusted port was not zero, or the no ip dhcp
snooping information option allow-untrusted

global configuration command is not configured
and a packet received on an untrusted port
contained option-82 data.

Source mac not equal to chaddr

Number of times the client MAC address field of
the DHCP packet (chaddr) does not match the
packet source MAC address and the ip dhcp
snooping verify mac-address
global
configuration command is configured.

Binding mismatch

Number of times a RELEASE or DECLINE
packet was received on a port that is different than
the port in the binding for that MAC
address-VLAN pair. This indicates someone
might be trying to spoof the real client, or it could
mean that the client has moved to another port on
the switch and issued a RELEASE or DECLINE.
The MAC address is taken from the chaddr field
of the DHCP packet, not the source MAC address
in the Ethernet header.

Advertising