<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi Brian- in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/enabling-dhcp-snooping-for-profiling-without-blocking-dhcp/m-p/2918700#M36442</link>
    <description>&lt;P&gt;Hi Brian-&lt;/P&gt;
&lt;P&gt;If you want to use DHCP Snooping then you must define the trusted ports. Otherwise, as you have already mentioned, your clients will not get addresses from DHCP.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;With that being said, what are your concerns with enabling trust interfaces?&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;</description>
    <pubDate>Sat, 30 Apr 2016 18:16:56 GMT</pubDate>
    <dc:creator>nspasov</dc:creator>
    <dc:date>2016-04-30T18:16:56Z</dc:date>
    <item>
      <title>Enabling DHCP Snooping for profiling without blocking DHCP requests</title>
      <link>https://community.cisco.com/t5/network-access-control/enabling-dhcp-snooping-for-profiling-without-blocking-dhcp/m-p/2918699#M36434</link>
      <description>&lt;P&gt;I am reading through a lot of documentation trying to increase my knowledge on how ISE Profiling works.&lt;/P&gt;
&lt;P&gt;I have found many design guides that say to enable these commands:&lt;/P&gt;
&lt;P&gt;ip dhcp snooping&lt;/P&gt;
&lt;P&gt;ip dhcp snooping vlan [VLAN ID's]&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I understand the basic concept of what DHCP snooping does, but if I enable it and enable it on a VLAN, what is preventing the switch from dropping the DHCP packets because I havent configured any of the dhcp trust interfaces?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 06:42:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/enabling-dhcp-snooping-for-profiling-without-blocking-dhcp/m-p/2918699#M36434</guid>
      <dc:creator>BTinNC</dc:creator>
      <dc:date>2019-03-11T06:42:58Z</dc:date>
    </item>
    <item>
      <title>Hi Brian-</title>
      <link>https://community.cisco.com/t5/network-access-control/enabling-dhcp-snooping-for-profiling-without-blocking-dhcp/m-p/2918700#M36442</link>
      <description>&lt;P&gt;Hi Brian-&lt;/P&gt;
&lt;P&gt;If you want to use DHCP Snooping then you must define the trusted ports. Otherwise, as you have already mentioned, your clients will not get addresses from DHCP.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;With that being said, what are your concerns with enabling trust interfaces?&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 30 Apr 2016 18:16:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/enabling-dhcp-snooping-for-profiling-without-blocking-dhcp/m-p/2918700#M36442</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2016-04-30T18:16:56Z</dc:date>
    </item>
  </channel>
</rss>

