Chapter 14 DHCP Snooping Configuration DGS-3610 Series Configuration Guide
14.2.7 Writing DHCP Snooping Database
Information to Flash Manually
In order to prevent loss of DHCP user information in the device due to restart of device
following electricity failure, you can write information in the current DHCP Snooping binding
database to the flash manually if required in addition to schedule writing to the flash.
DGS-3610# configure terminal
DGS-3610(config)# ip dhcp snooping database
write-to-flash
Write information in the DHCP Snooping
database to the flash
The following example demonstrates how to write information in the DHCP Snooping
database to the flash:
DGS-3610# configure terminal
DGS-3610(config)# ip dhcp snooping database write-to-flash
DGS-3610(config)# end
14.2.8 Configuring Port as TRUST Port
You can set a port as a TRUST port by using this command. By default, all the ports are
UNTRUST ports:
DGS-3610# configure terminal
DGS-3610(config)# interface interface
Enter the interface configuration mode.
DGS-3610(config-if)# [no] ip dhcp snooping
trust
Set the port as a trust port
The following example shows how to set Port 1 of the device as a TRUST port:
DGS-3610# configure terminal
DGS-3610(config)# interface gigabitEthernet 0/1
DGS-3610(config-if)# ip dhcp snooping trust
DGS-3610(config-if)# end
DGS-3610#
When DHCP Snooping is enabled, only the DHCP response packets
sent by the servers connected with the TRUST port will be forwarded.
14.2.9 Clearing Dynamic User Information
from DHCP Snooping Database
This command is used to clear information from the current DHCP Snooping database.