Ip dhcp snooping trust – Brocade 6910 Ethernet Access Switch Configuration Guide (Supporting R2.2.0.0) User Manual
Page 274

218
Brocade 6910 Ethernet Access Switch Configuration Guide
53-1002651-02
10
DHCP Snooping
Example
This example sets the DHCP Snooping Information circuit-id suboption string.
Console(config)#interface ethernet 1/1
Console(config-if)#ip dhcp snooping information option circuit-id string 6910
Console(config-if)#
ip dhcp snooping trust
This command configures the specified interface as trusted. Use the no form to restore the default
setting.
Syntax
[no] ip dhcp snooping trust
Default Setting
All interfaces are untrusted
Command Mode
Interface Configuration (Ethernet, Port Channel)
Command Usage
•
A trusted interface is an interface that is configured to receive only messages from within the
network. An untrusted interface is an interface that is configured to receive messages from
outside the network or fire wall.
•
Set all ports connected to DHCP servers within the local network or fire wall to trusted, and all
other ports outside the local network or fire wall to untrusted.
•
When DHCP snooping is enabled globally using the
command, and enabled
on a VLAN with
command, DHCP packet filtering will be performed on
any untrusted ports within the VLAN according to the default status, or as specifically
configured for an interface with the
no
command.
•
When an untrusted port is changed to a trusted port, all the dynamic DHCP snooping bindings
associated with this port are removed.
•
Additional considerations when the switch itself is a DHCP client – The port(s) through which it
submits a client request to the DHCP server must be configured as trusted.
Example
This example sets port 5 to untrusted.
Console(config)#interface ethernet 1/5
Console(config-if)#no ip dhcp snooping trust
Console(config-if)#
Related Commands