Application environment of trusted ports, Configuring trusted ports in a cascaded network – H3C Technologies H3C S10500 Series Switches User Manual
Page 82

71
Application environment of trusted ports
Configuring a trusted port connected to a DHCP server
Figure 33 Configure trusted and untrusted ports
As shown in
, the DHCP snooping device port that is connected to an authorized DHCP server
should be configured as a trusted port. The trusted port forwards reply messages from the authorized
DHCP server to the client, but the untrusted port does not forward reply messages from the unauthorized
DHCP server. This ensures that the DHCP client obtains an IP address from the authorized DHCP server.
Configuring trusted ports in a cascaded network
In a cascaded network involving multiple DHCP snooping devices, the ports connected to other DHCP
snooping devices should be configured as trusted ports.
To save system resources, you can disable the trusted ports, which are indirectly connected to DHCP
clients, from recording client IP-to-MAC bindings upon receiving DHCP requests.
Figure 34 Configure trusted ports in a cascaded network