Dhcp Snooping Interface Configuration; Figure 157: Dhcp Snooping Interface Configuration; Table 140: Dhcp Snooping Interface Configuration - D-Link DWL-8600AP User Manual

Dws-4000 series access points
Hide thumbs Also See for DWL-8600AP:
Table of Contents

Advertisement

D-Link UWS User Manual

DHCP Snooping Interface Configuration

The hardware rate limits DHCP packets sent to the CPU from untrusted interfaces to 15 packets per second.
There is no hardware rate limiting on trusted interfaces.
To prevent DHCP packets from being used as a DoS attack when DHCP snooping is enabled, the snooping
application enforces a rate limit for DHCP packets received on untrusted interfaces. DHCP snooping monitors
the receive rate on each interface separately. If the receive rate exceeds the configuration limit, DHCP
snooping brings down the interface. You must do "no shutdown" on this interface to further work with that
port. You can configure both the rate and the burst interval.
The DHCP snooping application processes incoming DHCP messages. For DHCPRELEASE and DHCPDECLINE
messages, the application compares the receive interface and VLAN with the client's interface and VLAN in the
binding database. If the interfaces do not match, the application logs the event and drops the message. For
valid client messages, DHCP snooping compares the source MAC address to the DHCP client hardware address.
Where there is a mismatch, DHCP snooping logs and drops the packet. You can disable this feature using the
DHCP Snooping Interface Configuration page, shown in
command. DHCP snooping forwards valid client messages on trusted members within the
verify mac-address
VLAN. If DHCP relay and/or DHCP server co-exist with the DHCP snooping, the DHCP client message will be sent
to the DHCP relay and/or DHCP server to process further.
To access the DHCP Snooping Interface Configuration page, click LAN > L2 Features > DHCP Snooping >
Interface Configuration in the navigation tree.
Field
Interface
Trust State
Logging Invalid Packets
D-Link
Oct. 2015

Figure 157: DHCP Snooping Interface Configuration

Table 140: DHCP Snooping Interface Configuration

Description
Select the interface for which data is to be displayed or configured.
If it is enabled, the DHCP snooping application considers the port as trusted.
The default is Disable.
If it is enabled, the DHCP snooping application logs invalid packets on this
interface. The default is Disable.
Figure 157
below, or by using the
Unified Wired and Wireless Access System
Configuring DHCP Snooping
no ip dhcp snooping
Page 257

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents