<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi Matt in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/how-to-configure-ip-dhcp-snooping-and-trusted-ports-on-a-cisco/m-p/3004245#M23693</link>
    <description>&lt;P&gt;Hi Matt&lt;/P&gt;
&lt;P&gt;Yes, disable the dhcp information option if you are not using it. When dhcp snooping is enabled, the default trust setting for interfaces is untrusted so you should apply &lt;STRONG&gt;ip dhcp snooping&lt;/STRONG&gt; &lt;STRONG&gt;trust&lt;/STRONG&gt; on interfaces leading to where your dhcp server is located. Following link explains it better:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SX/configuration/guide/book/snoodhcp.html#wp1114389&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;hth&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
    <pubDate>Sat, 04 Mar 2017 09:41:15 GMT</pubDate>
    <dc:creator>andrewswanson</dc:creator>
    <dc:date>2017-03-04T09:41:15Z</dc:date>
    <item>
      <title>How to Configure IP DHCP Snooping and Trusted Ports on a Cisco ISE NAD Configuration</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-configure-ip-dhcp-snooping-and-trusted-ports-on-a-cisco/m-p/3004242#M23690</link>
      <description>&lt;P&gt;Hello All,&lt;BR /&gt;&lt;BR /&gt;So we have recently configured our main/core switch &lt;EM&gt;(*4510R+E)&lt;/EM&gt; to begin authenticating devices using Cisco ISE, which is now configured and seems to be working as expected. Now, I'm trying to configure a 3560 switch that we have located in our IT work area. The 3560 is connected directly to the 4510 via a trunk port.&lt;BR /&gt;&lt;BR /&gt;I have gotten the 3560 completely configured to authenticate endpoints through our ISE server, which it does. The problem I'm running into is when I enable DHCP Snooping on the 3560 &lt;EM&gt;(*snooping is NOT configured on the 4510 as of yet)&lt;/EM&gt; no connected endpoints can get a DHCP address. If I disable dhcp snooping then DHCP begins working again.&lt;BR /&gt;&lt;BR /&gt;The guide I used for configuring the Network Access Devices &lt;EM&gt;(*i.e. Routers and Switches)&lt;/EM&gt; was the &lt;EM&gt;Cisco Identity Services Engine Administrator Guide, Release 2.0&lt;/EM&gt;. Chapter 33 of this guide is where you'll find the commands required to enable ISE on the switches. Now, in this chapter they say you can optionally enable dhcp snooping. But, the only commands they give you are:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;ip dhcp snooping             &lt;SPAN style="color: #0000ff;"&gt;&lt;EM&gt;!--&amp;gt; enables dhcp snooping&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;ip dhcp snooping vlan x-y    &lt;SPAN style="color: #0000ff;"&gt;&lt;EM&gt;!--&amp;gt; Enable Snooping on specific Vlans Only&lt;/EM&gt;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;Now, enabling just these 2 commands prevents devices on the 3560 from getting a DHCP address, because if I remove those commands they can immediately get a DHCP address without issue. So searching around a bit online I found the &lt;A href="http://www.cisco.com/c/dam/en/us/solutions/collateral/enterprise/design-zone-security/howto_10_universal_switch_config.pdf" target="_blank"&gt;Cisco TrustSec HowTo: Global Switch Configuration Guide &lt;/A&gt;. In this guide they also describe how to enable dhcp snooping, except they include another command, which is &lt;SPAN style="font-family: courier new,courier,monospace; font-size: 10pt;"&gt;&lt;STRONG&gt;&lt;EM&gt;"ip dhcp snooping trust"&lt;/EM&gt;&lt;/STRONG&gt;&lt;/SPAN&gt; and according to this guide it states the following:&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-family: courier new,courier,monospace; font-size: 10pt;"&gt;&lt;EM&gt;"Before configuring DHCP snooping, be sure to note the location of your trusted DHCP servers. When you configure DHCP snooping, the switch will deny DHCP server replies from any port not configured as “trusted.” &lt;SPAN style="color: #ff0000;"&gt;Enter interface configuration mode for the uplink interface and configure it as a trusted port.&lt;/SPAN&gt;"&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Since the DHCP server for the Vlan/Subnet being &lt;EM&gt;"&lt;/EM&gt;&lt;EM&gt;snooped"&lt;/EM&gt; is located on a Linux box connected to the 4510 Core Switch, wouldn't the &lt;STRONG&gt;&lt;EM&gt;Uplink&lt;/EM&gt;&lt;/STRONG&gt;&lt;EM&gt;&lt;/EM&gt; interface be the Trunk port on the 3560 connecting it to the 4510..?&lt;BR /&gt;&lt;BR /&gt;If I add the &lt;SPAN style="font-family: courier new,courier,monospace; font-size: 10pt;"&gt;&lt;EM&gt;"&lt;/EM&gt;&lt;EM&gt;ip dhcp snooping trust"&lt;/EM&gt;&lt;/SPAN&gt; command to the Trunk port on the 3560, no devices connected to this switch can get a DHCP Address. However, if I add the &lt;EM&gt;trust&lt;/EM&gt; command to the Switchports where the PC/devices are connected to on the 3560, they can then get a DHCP address no problem.&lt;BR /&gt;&lt;BR /&gt;So my question is why isn't this working with the trust command configured on the Trunk port only, and why does it only work if the trust command is added to each individual switchport where a PC/Device/Phone is connected. According to the guide, it doesn't sound like this is how it's supposed to work. See screenshot below:&lt;/P&gt;
&lt;HR /&gt;
&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/media/cisco_trustsec_switch_config_guide-dhcp_snooping.png" class="migrated-markup-image" /&gt;&lt;/P&gt;
&lt;HR /&gt;
&lt;P&gt;&lt;BR /&gt;If anyone has any thoughts or suggestions please feel free to reply.&lt;BR /&gt;&lt;BR /&gt;Thanks in Advance,&lt;BR /&gt;Matt&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 07:30:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-configure-ip-dhcp-snooping-and-trusted-ports-on-a-cisco/m-p/3004242#M23690</guid>
      <dc:creator>Matthew Martin</dc:creator>
      <dc:date>2019-03-11T07:30:50Z</dc:date>
    </item>
    <item>
      <title>Hi</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-configure-ip-dhcp-snooping-and-trusted-ports-on-a-cisco/m-p/3004243#M23691</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;Add the following command to your 3560:&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;no ip dhcp snooping information option&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;See the following post for details:&lt;/P&gt;
&lt;P&gt;http://blog.ine.com/2009/07/22/understanding-dhcp-option-82/&lt;/P&gt;
&lt;P&gt;hth&lt;BR /&gt;Andy&lt;/P&gt;</description>
      <pubDate>Fri, 03 Mar 2017 19:57:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-configure-ip-dhcp-snooping-and-trusted-ports-on-a-cisco/m-p/3004243#M23691</guid>
      <dc:creator>andrewswanson</dc:creator>
      <dc:date>2017-03-03T19:57:27Z</dc:date>
    </item>
    <item>
      <title>Hey Andy, thanks for the</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-configure-ip-dhcp-snooping-and-trusted-ports-on-a-cisco/m-p/3004244#M23692</link>
      <description>&lt;P&gt;Hey Andy, thanks for the reply!&lt;BR /&gt;&lt;BR /&gt;Perfect, that seemed to fix it, Thank you!&lt;BR /&gt;&lt;BR /&gt;From your link, it sounds like when DHCP Snooping is enabled on a Cisco Catalyst device it automatically inserts a &lt;EM&gt;&lt;STRONG&gt;giaddr&lt;/STRONG&gt;&lt;/EM&gt; of 0.0.0.0, and by default Cisco IOS devices reject packets that have a ZERO address for &lt;EM&gt;giaddr&lt;/EM&gt;...&lt;BR /&gt;&lt;BR /&gt;So, does that mean whenever you enable DHCP Snooping on a Catalyst Router/Switch, you should also disable the adding of &lt;STRONG&gt;option 82&lt;/STRONG&gt; to the DHCP packets sent to the DHCP Server?&lt;BR /&gt;&lt;BR /&gt;Does that sound correct?&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;EDIT:&lt;/STRONG&gt; Also, am I supposed to keep the &lt;EM&gt;&lt;STRONG&gt;"ip dhcp snooping trust"&lt;/STRONG&gt;&lt;/EM&gt;&lt;EM&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/EM&gt;command on the uplink trunk port that goes to the 4510..? This is the interface/port that connects the 3560 to the 4510 &lt;EM&gt;(*the 4510 is where the DHCP server is connected)&lt;/EM&gt;.&lt;BR /&gt;&lt;BR /&gt;Thanks again for your reply, very much appreciated!&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;Matt&lt;/P&gt;</description>
      <pubDate>Fri, 03 Mar 2017 23:03:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-configure-ip-dhcp-snooping-and-trusted-ports-on-a-cisco/m-p/3004244#M23692</guid>
      <dc:creator>Matthew Martin</dc:creator>
      <dc:date>2017-03-03T23:03:10Z</dc:date>
    </item>
    <item>
      <title>Hi Matt</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-configure-ip-dhcp-snooping-and-trusted-ports-on-a-cisco/m-p/3004245#M23693</link>
      <description>&lt;P&gt;Hi Matt&lt;/P&gt;
&lt;P&gt;Yes, disable the dhcp information option if you are not using it. When dhcp snooping is enabled, the default trust setting for interfaces is untrusted so you should apply &lt;STRONG&gt;ip dhcp snooping&lt;/STRONG&gt; &lt;STRONG&gt;trust&lt;/STRONG&gt; on interfaces leading to where your dhcp server is located. Following link explains it better:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SX/configuration/guide/book/snoodhcp.html#wp1114389&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;hth&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Sat, 04 Mar 2017 09:41:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-configure-ip-dhcp-snooping-and-trusted-ports-on-a-cisco/m-p/3004245#M23693</guid>
      <dc:creator>andrewswanson</dc:creator>
      <dc:date>2017-03-04T09:41:15Z</dc:date>
    </item>
  </channel>
</rss>

