Chapter 8
| General Security Measures
DHCP Snooping
– 247 –
will be performed on any untrusted ports within the VLAN as specified by the ip
dhcp snooping trust command.
â—† When the DHCP snooping is globally disabled, DHCP snooping can still be
configured for specific VLANs, but the changes will not take effect until DHCP
snooping is globally re-enabled.
â—† When DHCP snooping is globally enabled, and DHCP snooping is then disabled
on a specific VLAN, all dynamic bindings learned for this VLAN are removed
from the binding table.
Example
This example enables DHCP snooping for VLAN 1.
Console(config)#ip dhcp snooping vlan 1
Console(config)#
Related Commands
ip dhcp snooping (242)
ip dhcp snooping trust (247)
ip dhcp snooping trust This command configures the specified interface as trusted. Use the no form to
restore the default setting.
Syntax
[no] ip dhcp snooping trust
Default Setting
All interfaces are untrusted
Command Mode
Interface Configuration (Ethernet, Port Channel)
Command Usage
â—† A trusted interface is an interface that is configured to receive only messages
from within the network. An untrusted interface is an interface that is
configured to receive messages from outside the network or fire wall.
â—† Set all ports connected to DHCP servers within the local network or fire wall to
trusted, and all other ports outside the local network or fire wall to untrusted.
â—† When DHCP snooping is enabled globally using the ip dhcp snooping
command, and enabled on a VLAN with ip dhcp snooping vlan command,
DHCP packet filtering will be performed on any untrusted ports within the
VLAN according to the default status, or as specifically configured for an
interface with the no ip dhcp snooping trust command.