EasyManua.ls Logo

3Com 4210 9-Port - DHCP Snooping Configuration; Configuring DHCP Snooping; Configuring DHCP Snooping Trusted;Untrusted Ports

3Com 4210 9-Port
870 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
3-5
z Filtering the source IP address in a packet. If the source IP address and the number of the port that
receives the packet are consistent with entries in the DHCP-snooping table or static binding table,
the switch regards the packet as a valid packet and forwards it; otherwise, the switch drops it
directly.
z Filtering the source IP address and the source MAC address in a packet. If the source IP address
and source MAC address in the packet, and the number of the port that receives the packet are
consistent with entries in the DHCP-snooping table or static binding table, the switch regards the
packet as a valid packet and forwards it; otherwise, the switch drops it directly.
DHCP Snooping Configuration
Configuring DHCP Snooping
Follow these steps to configure DHCP snooping:
Operation Command Description
Enter system view
system-view
Enable DHCP snooping
dhcp-snooping
Required
By default, the DHCP snooping function
is disabled.
After DHCP snooping is enabled on a Switch 4210, clients connected with this switch cannot obtain IP
addresses dynamically through BOOTP.
Configuring DHCP Snooping Trusted/Untrusted Ports
Follow these steps to configure DHCP Snooping Trusted/Untrusted Ports:
Operation Command Description
Enter system view
system-view
Enter Ethernet port view
interface interface-type
interface-number
Specify the current port
as a trusted port
dhcp-snooping trust
Required
By default, after DHCP snooping is
enabled, all ports of the switch are
untrusted ports.

Table of Contents

Related product manuals