4-1 
4  DHCP Packet Rate Limit Configuration 
Introduction to DHCP Packet Rate Limit 
To prevent ARP attacks and attacks from unauthorized DHCP servers, ARP packets and DHCP packets 
will be processed by the switch CPU for validity checking. But, if attackers generate a large number of 
ARP packets or DHCP packets, the switch CPU will be under extremely heavy load. As a result, the 
switch cannot work normally and even goes down.  
Switch 4210 Family support ARP and DHCP packet rate limit on a port and shut down the port under 
attack to prevent hazardous impact on the device CPU. For details about ARP packet rate limit, refer to 
ARP Operation in this manual. The following describes only the DHCP packet rate limit function. 
After DHCP packet rate limit is enabled on an Ethernet port, the switch counts the number of DHCP 
packets received on this port per second. If the number of DHCP packets received per second exceeds 
the specified value, packets are passing the port at an over-high rate, which implies an attack to the port. 
In this case, the switch shuts down this port so that it cannot receive any packet, thus protect the switch 
from attacks.  
In addition, the switch supports port state auto-recovery. After a port is shut down due to over-high 
packet rate, it resumes automatically after a configurable period of time.  
 
 
When both port state auto-recovery interval for over-high ARP packet rate and port state auto-recovery 
interval for over-high DHCP packet rate are configured on a port, the shorter one will be the 
auto-recovery time.