2 dhcp snooping typical applications – Amer Networks SS2R48G4i V2 User Manual
Page 177
SS2R24G4i/SS2R48G4i
166
19.2.2 DHCP Snooping Typical Applications
非信任端口
非信任端口
Fig18-1
As showed in the above picture, Mac-AA device is the normal user,connected to the un-trusted
port 0/0/1 of the DCN switch. It acts as DHCP Client, and its IP is 1.1.1.5;DHCP Server and GateWay
connect to the trusted ports 0/0/11 and 0/0/12 of the DCN switch; malicious user Mac-BB connects to
the un-trusted port 0/0/10, trying to fake a DHCP Server(by sending DHCPACK). Configuring DHCP
Snooping on the switch will effectively discover and block such network attacks.
The followings are the configuration sequence
switch#
switch#config
switch(Config)#ip dhcp snooping
switch(Config)#interface ethernet 0/0/11
switch(Config-Ethernet0/0/11)#ip dhcp snooping trust
switch(Config-Ethernet0/0/11)#exit
switch(Config)#interface ethernet 0/0/12
switch(Config-Ethernet0/0/12)#ip dhcp snooping trust
switch(Config-Ethernet0/0/12)#exit
switch(Config)#interface ethernet 0/0/1-10
switch(Config-Port-Range)#ip dhcp snooping action shutdown
Command Explanation
Admin Mode
Login on
logging source {default |
m_shell|sys_event|anti_attack}
channel { console | logbuff |
loghost | monitor } [ level
{ critical | debugging |
notifications | warnings } [state
{ on | off } ] ]
Please refer to the chapter on system log