2 dhcp snooping typical applications – Amer Networks SS2R48G4i V2 User Manual

Page 177

Advertising
background image

SS2R24G4i/SS2R48G4i

166

19.2.2 DHCP Snooping Typical Applications

非信任端口

非信任端口

Fig18-1

As showed in the above picture, Mac-AA device is the normal user,connected to the un-trusted

port 0/0/1 of the DCN switch. It acts as DHCP Client, and its IP is 1.1.1.5;DHCP Server and GateWay
connect to the trusted ports 0/0/11 and 0/0/12 of the DCN switch; malicious user Mac-BB connects to
the un-trusted port 0/0/10, trying to fake a DHCP Server(by sending DHCPACK). Configuring DHCP
Snooping on the switch will effectively discover and block such network attacks.
The followings are the configuration sequence
switch#
switch#config
switch(Config)#ip dhcp snooping
switch(Config)#interface ethernet 0/0/11
switch(Config-Ethernet0/0/11)#ip dhcp snooping trust
switch(Config-Ethernet0/0/11)#exit
switch(Config)#interface ethernet 0/0/12
switch(Config-Ethernet0/0/12)#ip dhcp snooping trust
switch(Config-Ethernet0/0/12)#exit
switch(Config)#interface ethernet 0/0/1-10
switch(Config-Port-Range)#ip dhcp snooping action shutdown

Command Explanation
Admin Mode

Login on

logging source {default |

m_shell|sys_event|anti_attack}

channel { console | logbuff |

loghost | monitor } [ level

{ critical | debugging |

notifications | warnings } [state

{ on | off } ] ]

Please refer to the chapter on system log

Advertising