EasyManua.ls Logo

SMC Networks TigerSwitch SMC6128PL2 User Manual

SMC Networks TigerSwitch SMC6128PL2
658 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #623 background imageLoading...
Page #623 background image
DHCP S
NOOPING
C
OMMANDS
4-305
ip dhcp snooping trust (4-305)
ip dhcp snooping trust
This command configures the specified interface as trusted. Use the no
form to restore the default setting.
Syntax
[no] ip dhcp snooping trust
Default Setting
All interfaces are untrusted
Command Mode
Interface Configuration (Ethernet, Port Channel)
Command Usage
An untrusted interface is an interface that is configured to receive
messages from outside the network or firewall. A trusted interface is
an interface that is configured to receive only messages from within
the network.
When DHCP snooping enabled globally using the ip dhcp snooping
command (page -301), and enabled on a VLAN with this command,
DHCP packet filtering will be performed on any untrusted ports
within the VLAN according to the default status, or as specifically
configured for an interface with the no ip dhcp snooping trust
command.
When an untrusted port is changed to a trusted port, all the dynamic
DHCP snooping bindings associated with this port are removed.
Additional considerations when the switch itself is a DHCP client – The port(s)
through which it submits a client request to the DHCP server must be
configured as trusted.
Example
This example sets port 5 to untrusted.
Console(config)#interface ethernet 1/5
Console(config-if)#no ip dhcp snooping trust
Console(config-if)#

Table of Contents

Other manuals for SMC Networks TigerSwitch SMC6128PL2

Questions and Answers:

SMC Networks TigerSwitch SMC6128PL2 Specifications

General IconGeneral
PoEYes
PoE Ports24
Switching Capacity12.8 Gbps
Forwarding Rate9.5 Mpps
LayerLayer 2
MAC Address Table Size8K
Jumbo Frame Support9 KB
Power SupplyInternal
Weight3.6 kg
Operating Temperature0°C to 40°C
Storage Temperature-40°C to 70°C
Humidity10% to 90% non-condensing
FeaturesVLAN, QoS, IGMP Snooping, Link Aggregation, Port Mirroring
Ports24 x 10/100 Mbps + 4 x Gigabit Combo (RJ45/SFP)

Summary

Introduction

Key Features

Lists key features and capabilities of the switch, including port specifications and management options.

Description of Software Features

Details advanced performance features like flow control, broadcast storm suppression, and VLAN support.

Authentication

Explains management access authentication via console, Telnet, web, RADIUS, TACACS+, and 802.1X.

Initial Configuration

Connecting to the Switch

Details steps for connecting to the switch via console port or Telnet for configuration.

Setting an IP Address

Configures manual or dynamic IP address settings for management access over the network.

Configuring the Switch

Using the Web Interface

Describes configuring the switch and viewing statistics via a web browser.

Simple Network Management Protocol (SNMP)

Explains the SNMP protocol for network device management, including versions 1, 2c, and 3.

User Authentication

Restricts management access using local or remote authentication methods.

Configuring the Secure Shell

Details SSH server configuration for secure remote management access.

Configuring Port Security

Allows configuring MAC addresses authorized to access switch ports.

Configuring 802.1X Port Authentication

Implements port-based access control preventing unauthorized network access.

Access Control Lists

Provides packet filtering for IP frames or any frames based on addresses or protocols.

Power Over Ethernet Settings

Configures DC power supply to connected devices via Ethernet, including power budget and priority.

Spanning Tree Algorithm Configuration

Configures Spanning Tree protocols (STP, RSTP, MSTP) globally and for interfaces.

VLAN Configuration

Describes creating VLAN groups, adding members, and configuring VLAN behavior.

Switch Clustering

Groups switches for centralized management through a Commander/Member unit structure.

Quality of Service Commands

Configures QoS classification criteria and service policies using DiffServ.

Multicast Filtering Commands

Supports real-time applications like videoconferencing or streaming audio using IGMP.

DHCP Snooping Commands

Protects the network from rogue DHCP servers by filtering DHCP messages.

Command Line Interface

Using the Command Line Interface

Guides on using the CLI for switch management via keywords and parameters.

Class of Service Configuration

Specifies data packet precedence based on congestion and priority queues.

IP Source Guard Commands

Filters IP traffic based on configured entries in the IP Source Guard table.

Appendix B Troubleshooting

Related product manuals