0% found this document useful (0 votes)
73 views4 pages

Understanding and Configuring DHCP Snooping

This chapter describes how to configure DHCP snooping on Cisco switches to filter untrusted DHCP messages and build a DHCP snooping binding table. The key points are: 1) DHCP snooping acts as a firewall between untrusted hosts and DHCP servers by differentiating between trusted interfaces connected to DHCP servers and untrusted interfaces connected to end users. 2) It can be enabled globally on a switch and independently configured for each VLAN. 3) By default, DHCP snooping is disabled and all DHCP relay configuration commands are disabled when snooping is enabled. 4) Configuration involves enabling snooping globally and per VLAN, enabling Option 82 data insertion, configuring interfaces as trusted or untrusted, and setting rate

Uploaded by

snippermiri
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
73 views4 pages

Understanding and Configuring DHCP Snooping

This chapter describes how to configure DHCP snooping on Cisco switches to filter untrusted DHCP messages and build a DHCP snooping binding table. The key points are: 1) DHCP snooping acts as a firewall between untrusted hosts and DHCP servers by differentiating between trusted interfaces connected to DHCP servers and untrusted interfaces connected to end users. 2) It can be enabled globally on a switch and independently configured for each VLAN. 3) By default, DHCP snooping is disabled and all DHCP relay configuration commands are disabled when snooping is enabled. 4) Configuration involves enabling snooping globally and per VLAN, enabling Option 82 data insertion, configuring interfaces as trusted or untrusted, and setting rate

Uploaded by

snippermiri
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

C H A P T E R 17

Understanding and Configuring DHCP Snooping

This chapter describes how to configure Dynamic Host Configuration Protocol (DHCP) snooping on
Catalyst 4000 family switches. It provides guidelines, procedures, and configuration examples.
This chapter consists of the following major sections:
• Overview of DHCP Snooping, page 17-1
• Configuring DHCP Snooping, page 17-2
• Displaying DHCP Snooping Information, page 17-4

Note For complete syntax and usage information for the switch commands used in this chapter, refer to the
Cisco IOS Command Reference for the Catalyst 4000 Family and related publications at
http://www.cisco.com/univercd/cc/td/doc/product/lan/cat4000/12_1_12/index.htm

Overview of DHCP Snooping


DHCP snooping is a DHCP security feature that provides security by filtering untrusted DHCP messages
and by building and maintaining a DHCP snooping binding table. An untrusted message is a message
that is received from outside the network or firewall and that can cause traffic attacks within your
network.
The DHCP snooping binding table contains the MAC address, IP address, lease time, binding type,
VLAN number, and interface information that corresponds to the local untrusted interfaces of a switch;
it does not contain information regarding hosts interconnected with a trusted interface. An untrusted
interface is an interface that is configured to receive messages from outside the network or firewall. A
trusted interface is an interface that is configured to receive only messages from within the network.
DHCP snooping acts like a firewall between untrusted hosts and DHCP servers. It also gives you a way
to differentiate between untrusted interfaces connected to the end-user and trusted interfaces connected
to the DHCP server or another switch.

Note In order to enable DHCP snooping on a VLAN, you must enable DHCP snooping on the switch.

You can configure DHCP snooping for switches and VLANs. When you enable DHCP snooping on a
switch, the interface acts as a Layer 2 bridge, intercepting and safeguarding DHCP messages going to a
Layer 2 VLAN. When you enable DHCP snooping on a VLAN, the switch acts as a Layer 2 bridge
within a VLAN domain.

Cisco IOS Software Configuration Guide—Release 12.1(12c)EW


78-14488-01 17-1
Chapter 17 Understanding and Configuring DHCP Snooping
Configuring DHCP Snooping

Note For DHCP server configuration information, refer to “Configuring DHCP” in the Cisco IOS IP and IP
Routing Configuration Guide at the following URL:
http://www.cisco.com/univercd/cc/td/doc/product/software/ios121/121cgcr/ip_c/ipcprt1/1cddhcp.htm

Configuring DHCP Snooping


When you configure DHCP snooping on your switch, you are enabling the switch to differentiate
untrusted interfaces from trusted interfaces. You must enable DHCP snooping globally before you can
use DHCP snooping on a VLAN. You can enable DHCP snooping independently from other DHCP
features.
Once you have enabled DHCP snooping, all the DHCP relay information option configuration
commands are disabled; this includes the following commands:
• ip dhcp relay information check
• ip dhcp relay information policy
• ip dhcp relay information option
• ip dhcp relay information trusted
• ip dhcp relay information trust-all
These sections describe how to configure DHCP snooping:
• Default Configuration for DHCP Snooping
• Enabling DHCP Snooping

Default Configuration for DHCP Snooping


DHCP snooping is disabled by default. Table 17-1 shows all the default configuration values for each
DHCP snooping option.

Table 17-1 Default Configuration Values for DHCP Snooping

Option Default Value/State


DHCP snooping Disabled
DHCP snooping information option Enabled
DHCP snooping limit rate Infinite (functions as if rate limiting were disabled)
DHCP snooping trust Untrusted
DHCP snooping vlan Disabled

If you want to change the default configuration values, see the “Enabling DHCP Snooping” section.

Cisco IOS Software Configuration Guide—Release 12.1(12c)EW


17-2 78-14488-01
Chapter 17 Understanding and Configuring DHCP Snooping
Configuring DHCP Snooping

Enabling DHCP Snooping


To enable DHCP snooping, follow this procedure:

Task Command
Step 1 Enable DHCP snooping globally. Switch(config)# ip dhcp snooping

You can use the no keyword to disable DHCP snooping.


Step 2 Enable DHCP snooping on your VLANs. Switch(config)# ip dhcp snooping vlan number
[number]
Step 3 Enable DHCP Option 82 data insertion. Switch(config)# ip dhcp snooping information
option
Step 4 Configure the interface as trusted or untrusted. Switch(config-if)# ip dhcp snooping trust

You can use the no keyword of to configure an interface


to receive only messages from within the network.
Step 5 Configure the number of DHCP packets per second (pps) Switch(config-if)# ip dhcp snooping limit rate
that an interface can receive. rate

Note You may not want to configure untrusted rate


limiting to more than 100 pps.

Normally, the rate limit applies to untrusted


interfaces. If you want to set up rate limiting for
trusted interfaces, keep in mind that trusted
interfaces aggregate all DHCP traffic in the
switch, and you will need to adjust the rate limit
to a higher value.
Step 6 Exit configuration mode. Switch(config)# end

Step 7 Verify the configuration. Switch# show ip dhcp snooping

You can configure DHCP snooping for a single VLAN or a range of VLANs. To configure a single
VLAN, enter a single VLAN number. To configure a range of VLANs, enter a beginning and an ending
VLAN number.
This example shows how to enable DHCP snooping on VLANs 10 through 100:
Switch# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)# ip dhcp snooping
Switch(config)# ip dhcp snooping vlan 10 100
Switch(config)# ip dhcp snooping information option
Switch(config-if)# ip dhcp snooping trust
Switch(config-if)# ip dhcp snooping limit rate 100
Switch(config)# end
Switch# show ip dhcp snooping
DHCP Snooping is configured on the following VLANs:
10 30-40 100 200-220
Insertion of option 82 information is enabled.
Interface Trusted Rate limit (pps)
--------- ------- ----------------
FastEthernet2/1 yes 10
FastEthernet2/2 yes none
FastEthernet3/1 no 20
Switch#

Cisco IOS Software Configuration Guide—Release 12.1(12c)EW


78-14488-01 17-3
Chapter 17 Understanding and Configuring DHCP Snooping
Displaying DHCP Snooping Information

Displaying DHCP Snooping Information


You can display DHCP snooping binding table and configuration information for all interfaces on a
switch.

Displaying a Binding Table


The DHCP snooping binding table for each switch contains binding entries that correspond to untrusted
ports. It does not contain information about hosts interconnected with a trusted port, because each
interconnected switch will have its own DHCP snooping binding table.
This example shows how to display the DHCP snooping binding information for a switch.
Switch# show ip dhcp snooping binding
MacAddress IP Address Lease (seconds) Type VLAN Interface
----------- ----------- ---------------- ----- ----- ------------
0000.0100.0201 10.0.0.1 1600 dynamic 100 FastEthernet2/1
Switch#

Table 17-2 describes the fields in the show ip dhcp snooping binding command output.

Table 17-2 show ip dhcp snooping binding Command Output

Field Description
Mac Address Client hardware MAC address
IP Address Client IP address assigned from the DHCP server
Lease (seconds) IP address lease time
Type Binding type; statically configured from CLI or dynamically learned
VLAN VLAN number of the client interface
Interface Interface that connects to the DHCP client host

Displaying the DHCP Snooping Configuration


This example shows how to display the DHCP snooping configuration for a switch.
Switch# show ip dhcp snooping
Switch DHCP snooping is enabled.
DHCP Snooping is configured on the following VLANs:
10 30-40 100 200-220
Insertion of option 82 information is enabled.
Interface Trusted Rate limit (pps)
--------- ------- ----------------
FastEthernet2/1 yes 10
FastEthernet3/1 yes none
GigabitEthernet1/1 no 20
Switch#

Cisco IOS Software Configuration Guide—Release 12.1(12c)EW


17-4 78-14488-01

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy