3-5 
z  Filtering the source IP address in a packet. If the source IP address and the number of the port that 
receives the packet are consistent with entries in the DHCP-snooping table or static binding table, 
the switch regards the packet as a valid packet and forwards it; otherwise, the switch drops it 
directly.  
z  Filtering the source IP address and the source MAC address in a packet. If the source IP address 
and source MAC address in the packet, and the number of the port that receives the packet are 
consistent with entries in the DHCP-snooping table or static binding table, the switch regards the 
packet as a valid packet and forwards it; otherwise, the switch drops it directly.  
DHCP Snooping Configuration 
Configuring DHCP Snooping 
Follow these steps to configure DHCP snooping: 
Operation  Command  Description 
Enter system view 
system-view 
— 
Enable DHCP snooping  
dhcp-snooping 
Required 
By default, the DHCP snooping function 
is disabled. 
 
 
After DHCP snooping is enabled on a Switch 4210, clients connected with this switch cannot obtain IP 
addresses dynamically through BOOTP. 
 
Configuring DHCP Snooping Trusted/Untrusted Ports 
Follow these steps to configure DHCP Snooping Trusted/Untrusted Ports: 
Operation  Command  Description 
Enter system view 
system-view 
— 
Enter Ethernet port view 
interface interface-type 
interface-number 
— 
Specify the current port 
as a trusted port  
dhcp-snooping trust 
Required 
By default, after DHCP snooping is 
enabled, all ports of the switch are 
untrusted ports.