<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi,DHCP discovery message is in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/dhcp-snooping-untrusted-only-requests/m-p/2886573#M911785</link>
    <description>&lt;P&gt;Hi,&lt;BR /&gt;DHCP discovery message is first message from client in DHCP process so it will be allowed on untrusted ports.&lt;/P&gt;
&lt;P&gt;Also other kinds of messages are discarded:&lt;BR /&gt;- all messages from DHCP server received on untrusted port&lt;BR /&gt;- messages from DHCP client in which value "client MAC address" doesn´t match with MAC address of sender&lt;BR /&gt;- messages RELEASE and DECLINE from DHCP client, which MAC address is in database on different port than from which message arrived&lt;BR /&gt;- messages received on untrusted port, in which DHCP relay address is different than 0.0.0.0 or if there is option-82 in it&lt;/P&gt;
&lt;P&gt;Message which was not discarded will be sent only via trusted port&lt;/P&gt;</description>
    <pubDate>Mon, 11 Jul 2016 08:11:05 GMT</pubDate>
    <dc:creator>Milos Megis</dc:creator>
    <dc:date>2016-07-11T08:11:05Z</dc:date>
    <item>
      <title>dhcp snooping untrusted - only requests</title>
      <link>https://community.cisco.com/t5/network-security/dhcp-snooping-untrusted-only-requests/m-p/2886570#M911771</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;I would simply like to know why untrusted switch ports do allow dhcp requests at all? What is the logic behind it? Why don't they block dhcp traffic altogether?&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 13:51:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dhcp-snooping-untrusted-only-requests/m-p/2886570#M911771</guid>
      <dc:creator>vinciffs1</dc:creator>
      <dc:date>2020-02-21T13:51:35Z</dc:date>
    </item>
    <item>
      <title>Hi, you connect end user</title>
      <link>https://community.cisco.com/t5/network-security/dhcp-snooping-untrusted-only-requests/m-p/2886571#M911775</link>
      <description>&lt;P&gt;Hi, you connect end user devices (mostly PC) on untrusted ports.&lt;/P&gt;
&lt;P&gt;They should be allowed to request IP address from DHCP.&lt;/P&gt;
&lt;P&gt;But on untrusted ports there cannot be DHCP offer packets (packets sent by DHCP server). These packet can appear only on trusted ports. This mechanism protects network before connecting own DHCP server on untrusted ports (attack with DHCP rogue server).&lt;/P&gt;</description>
      <pubDate>Thu, 07 Jul 2016 05:58:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dhcp-snooping-untrusted-only-requests/m-p/2886571#M911775</guid>
      <dc:creator>Milos Megis</dc:creator>
      <dc:date>2016-07-07T05:58:47Z</dc:date>
    </item>
    <item>
      <title>So to be more exactly, do</title>
      <link>https://community.cisco.com/t5/network-security/dhcp-snooping-untrusted-only-requests/m-p/2886572#M911780</link>
      <description>&lt;P&gt;So to be more exactly, do untrusted ports also allow dhcp discovery packets for instance? And any other dhcp packets that might come from a dhcp client, but don't allow packets such as offer and other server-specific packets? In the curriculum, it only briefly talked about these REQ and ACK, as if these were the only ones involved in the dhcp process.&lt;/P&gt;</description>
      <pubDate>Sun, 10 Jul 2016 11:19:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dhcp-snooping-untrusted-only-requests/m-p/2886572#M911780</guid>
      <dc:creator>vinciffs1</dc:creator>
      <dc:date>2016-07-10T11:19:59Z</dc:date>
    </item>
    <item>
      <title>Hi,DHCP discovery message is</title>
      <link>https://community.cisco.com/t5/network-security/dhcp-snooping-untrusted-only-requests/m-p/2886573#M911785</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;DHCP discovery message is first message from client in DHCP process so it will be allowed on untrusted ports.&lt;/P&gt;
&lt;P&gt;Also other kinds of messages are discarded:&lt;BR /&gt;- all messages from DHCP server received on untrusted port&lt;BR /&gt;- messages from DHCP client in which value "client MAC address" doesn´t match with MAC address of sender&lt;BR /&gt;- messages RELEASE and DECLINE from DHCP client, which MAC address is in database on different port than from which message arrived&lt;BR /&gt;- messages received on untrusted port, in which DHCP relay address is different than 0.0.0.0 or if there is option-82 in it&lt;/P&gt;
&lt;P&gt;Message which was not discarded will be sent only via trusted port&lt;/P&gt;</description>
      <pubDate>Mon, 11 Jul 2016 08:11:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dhcp-snooping-untrusted-only-requests/m-p/2886573#M911785</guid>
      <dc:creator>Milos Megis</dc:creator>
      <dc:date>2016-07-11T08:11:05Z</dc:date>
    </item>
  </channel>
</rss>

