Network requirements – H3C Technologies H3C S7500E Series Switches User Manual
Page 250
13-9
[Sysname] interface gigabitethernet2/0/1
[Sysname-GigabitEthernet2/0/1] dhcp-snooping trust
[Sysname-GigabitEthernet2/0/1] quit
# Enable IP Source Guard on OLT 3/0/1.
[Sysname-Olt3/0/1] ip check source ip-address mac-address
[Sysname-Olt3/0/1] quit
# Create an ONU port ONU 3/0/1:1 and bind it with the ONU.
[Sysname] interface olt 3/0/1
[Sysname-Olt3/0/1] using onu 1
[Sysname-Olt3/0/1] quit
[Sysname] interface onu3/0/1:1
[Sysname-Onu3/0/1:1] bind onuid 000f-e200-0001
2) Verify
the
configuration.
# After the user obtains an IP address from the DHCP server, display the dynamic DHCP
snooping entry obtained by OLT 3/0/1 on the OLT device.
The Following User address bind have been configured:
Mac IP Vlan Port Status
0001-0203-0406 192.168.0.1 1 Olt3/0/1 DHCP-SNP
# Display the existing dynamic DHCP snooping entry to check whether it is the same as the one
obtained by OLT 3/0/1.
DHCP Snooping is enabled.
The client binding table for all untrusted ports.
Type : D--Dynamic , S--Static
Type IP Address MAC Address Lease VLAN Interface
==== =============== ============== ============ ==== =================
D 192.168.0.1 0001-0203-0406 86335 1 Onu3/0/1:1
The display shows that, after IP Source Guard is enabled on OLT 3/0/1, the port obtains the
dynamic entry generated by DHCP snooping.
Dynamic IP Source Guard Binding Function Configuration Example 3
Network requirements
As shown in
, Switch A connects to Client A and the DHCP server through interfaces
VLAN-interface 100 and VLAN-interface 200 respectively. DHCP Relay is enabled on Switch A.
Detailed requirements are as follows:
z
Client A (with the MAC address of 00-01-02-03-04-06) obtains an IP address from the
DHCP server through DHCP Relay.
z
On interface VLAN-interface 100, enable the dynamic IP source guard binding function to
filter packets by using the generated DHCP Relay entries.
Figure 13-5 Network diagram for configuring dynamic IP source guard binding