11.07.2015 Views

Catalyst 3750-E and 3560-E Switch Cisco IOS ... - DNIP . NET

Catalyst 3750-E and 3560-E Switch Cisco IOS ... - DNIP . NET

Catalyst 3750-E and 3560-E Switch Cisco IOS ... - DNIP . NET

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 2<strong>Catalyst</strong> <strong>3750</strong>-E <strong>and</strong> <strong>3560</strong>-E <strong>Switch</strong> <strong>Cisco</strong> <strong>IOS</strong> Comm<strong>and</strong>sip dhcp snooping information option allow-untrustedip dhcp snooping information option allow-untrustedUse the ip dhcp snooping information option allow-untrusted global configuration comm<strong>and</strong> on anaggregation switch to configure it to accept DHCP packets with option-82 information that are receivedon untrusted ports that might be connected to an edge switch. Use the no form of this comm<strong>and</strong> to returnto the default setting.ip dhcp snooping information option allow-untrustedno ip dhcp snooping information option allow-untrustedSyntax DescriptionThis comm<strong>and</strong> has no arguments or keywords.DefaultsThe switch drops DHCP packets with option-82 information that are received on untrusted ports thatmight be connected to an edge switch.Comm<strong>and</strong> ModesGlobal configurationComm<strong>and</strong> HistoryRelease12.2(35)SE2ModificationThis comm<strong>and</strong> was introduced.Usage GuidelinesYou might want an edge switch to which a host is connected to insert DHCP option-82 information atthe edge of your network. You might also want to enable DHCP security features, such as DHCPsnooping, IP source guard, or dynamic Address Resolution Protocol (ARP) inspection, on anaggregation switch. However, if DHCP snooping is enabled on the aggregation switch, the switch dropspackets with option-82 information that are received on an untrusted port <strong>and</strong> does not learn DHCPsnooping bindings for connected devices on a trusted interface.If the edge switch to which a host is connected inserts option-82 information <strong>and</strong> you want to use DHCPsnooping on an aggregation switch, enter the ip dhcp snooping information option allow-untrustedcomm<strong>and</strong> on the aggregation switch. The aggregation switch can learn the bindings for a host eventhough the aggregation switch receives DHCP snooping packets on an untrusted port. You can alsoenable DHCP security features on the aggregation switch. The port on the edge switch to which theaggregation switch is connected must be configured as a trusted port.NoteDo not enter the ip dhcp snooping information option allow-untrusted comm<strong>and</strong> on an aggregationswitch to which an untrusted device is connected. If you enter this comm<strong>and</strong>, an untrusted device mightspoof the option-82 information.OL-9776-08<strong>Catalyst</strong> <strong>3750</strong>-E <strong>and</strong> <strong>3560</strong>-E <strong>Switch</strong> Comm<strong>and</strong> Reference2-239

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!