EasyManua.ls Logo

H3C S3100 8C SI - Unauthorized DHCP Server Detection Configuration Example

H3C S3100 8C SI
944 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Operation Manual – DHCP
H3C S3100 Series Ethernet Switches Chapter 2 DHCP Snooping Configuration
2-17
2.5.2 Unauthorized DHCP Server Detection Configuration Example
I. Network requirements
As shown in Figure 2-7, Ethernet 1/0/1 of the switch (S3100-SI) is connected to the
DHCP server, and Ethernet 1/0/2 and Ethernet 1/0/3 are respectively connected to
Client A, Client B.
z Enable DHCP snooping on the switch.
z Enable unauthorized DHCP server detection on Ethernet 1/0/2 and Ethernet 1/0/3.
When an authorized DHCP server is detected on Ethernet 1/0/2, a trap message
will be sent; when an authorized DHCP server is detected on Ethernet 1/0/3, the
interface is shut down administratively.
z To prevent attackers from filtering the detecting DHCP-DISCOVER packets,
specify the source MAC address for such packets as 000f-e200-1111 (different
from the bridge MAC address of the switch) on the switch.
II. Network diagram
Eth1/0/1
DHCP server
Switch
Eth1/0/2 Eth1/0/3
ClientA ClientB
Figure 2-7 Network diagram for unauthorized DHCP server detection
III. Configuration procedure
# Enable DHCP snooping.
<Sysname> system-view
Enter system view, return to user view with Ctrl+Z.
[Sysname] dhcp-snooping
# Specify the source MAC address for the DHCP-DISCOVER messages as
000f-e200-1111.
[Sysname] dhcp-snooping server-guard source-mac 000f-e200-1111
# Enable unauthorized DHCP server detection on Ethernet 1/0/2.
[Sysname] interface ethernet1/0/2

Table of Contents

Related product manuals