2-9
Use the undo dhcp-snooping server-guard source-mac command to restore the default MAC
address.
By default, the source MAC address of DHCP-DISCOVER messages is the bridge MAC address of the
switch.
Note that among S3100 series switches, only S3100-SI series switches support the two commands.
Examples
# Specify the source MAC address for DHCP-DISCOVER messages as 000f-e200-3100.
<Sysname> system-view
System View: return to User View with Ctrl+Z.
[Sysname] dhcp-snooping server-guard source-mac 000f-e200-3100
dhcp-snooping trust
Syntax
dhcp-snooping trust
undo dhcp-snooping trust
View
Ethernet port view
Parameters
None
Description
Use the dhcp-snooping trust command to set an Ethernet port to a DHCP-snooping trusted port.
Use the undo dhcp-snooping trust command to restore an Ethernet port to a DHCP-snooping
untrusted port.
By default, with the DHCP snooping enabled, all the ports of a switch are untrusted ports.
Note that:
z Among S3100 series switches, only S3100-EI series switches support the two commands.
z After DHCP snooping is enabled, you need to specify the port connected to a valid DHCP server as
trusted to ensure that DHCP clients can obtain valid IP addresses. The trusted port and the ports
connected to DHCP clients must be in the same VLAN.
Related commands: display dhcp-snooping trust.
Examples
# Enter system view.
<Sysname> system-view
System View: return to User View with Ctrl+Z.
# Set the Ethernet 1/0/1 port to a trusted port.
[Sysname] interface Ethernet1/0/1
[Sysname-Ethernet1/0/1] dhcp-snooping trust