EasyManuals Logo

D-Link xStack DGS-3610 Series User Manual

D-Link xStack DGS-3610 Series
703 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #140 background imageLoading...
Page #140 background image
Chapter 14 DHCP Snooping Configuration DGS-3610 Series Configuration Guide
14-2
14.1.2 Understanding DHCP Snooping
DHCP Snooping monitors users by snooping the packets between the client and the server.
DHCP Snooping can also be used to filter DHCP packets. It can be configured properly to
filter illegal servers. Some terms and functions used in DHCP Snooping are explained
below:
DHCP Snooping TRUST port: Because the packets for obtaining IP using DHCP are
broadcast, some illegal servers may prevent users from obtaining the IP, or even illegal
servers are used to cheat and steal user information. In order to avoid the problem of illegal
server, DHCP Snooping classified the ports into two types: TRUST port and UNTRUST port.
The device only forwards the DHCP Reply packets received through the TRUST port, while
discarding all the DHCP Reply packets from the UNTRUST port. This way, the illegal DHCP
Server can be shielded by setting the port connected to the legal DHCP Server as a TURST
port and other ports as UNTRUST ports.
DHCP Snooping binding database: It‘s usually that the users in the network set the IP
addresses by themselves in the DHCP networks.. This makes it difficult to maintain the
network and makes users who obtains IP addresses using DHCP unable to normally use the
network due to conflict. DHCP Snooping snoops the packets between the Client and the
Server, and combines the IP information that the user obtains, user MAC, VID, PORT and
lease into a record entry. This creates a user database of DHCP Snooping, which is used
with the ARP inspection function to control users' access to the network.
DHCP Snooping checks the validity of DHCP packets that pass the device, discard illegal
DHCP packets, and records user information to create a DHCP Snooping binding database
for ARP to inspecte and query. The following DHCP packets are considered illegal:
1. The DHCP reply packets received through UNTRUST ports, including DHCPACK,
DHCPNACK, DHCPOFFER, etc.
2. Packets with different DHCP Client field values in the source MAC and DHCP packets
when MAC check is enabled.
3. DHCPRELEASE packets with user information in the DHCP Snooping binding
database but the port information inconsistent with the port information in the device
information stored in the DHCP binding database.
14.1.3 Understanding DHCP Snooping
information option
Part of network administrators hope to assign the IP to users according to their position
when they carry out the IP management for current users. Namely, they hope to carry out the
IP assignment according to the information of the network device that connects with users,
so that the switch can add the device information related to some users into the DHCP
request message in the DHCP option way, according to RFC3046 when they carry out the
DHCP snooping. The used option number is 82, and the content server that is uploaded by

Table of Contents

Other manuals for D-Link xStack DGS-3610 Series

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the D-Link xStack DGS-3610 Series and is the answer not in the manual?

D-Link xStack DGS-3610 Series Specifications

General IconGeneral
BrandD-Link
ModelxStack DGS-3610 Series
CategorySwitch
LanguageEnglish

Related product manuals