01-14-2013 12:33 AM - edited 03-07-2019 11:04 AM
Hello,
I have created a new VLAN and want to enable DHCP snooping to stop someone putting a DHCP device onthe network (has happened before). I read that I must put ports connected to hosts into trusted port mode, so what happens when a user takes his PC out and puts a DHCP device into that port?
Thanks
01-14-2013 12:56 AM
Hello Andy,
I read that I must put ports connected to hosts into trusted port mode
That must be a misinterpretation. Ports towards normal hosts must be in the untrusted mode. Only ports between switches and ports towards DHCP servers should be configured as trusted ports.
Best regards,
Peter
01-14-2013 01:38 AM
Thanks guys.
Regards
01-14-2013 02:01 AM
Hello Andy,
So I treat ports connected to hosts as untrusted and trunks or ports connected to DHCP servers as trusted?
Correct.
Will this cause an issue with hubs as (I know) in som esites we have a hub or 2 plugged into a switch due to a loack of floor ports?
There will be no issues as long as the hub connects only to untrusted or only to trusted devices (you can not mix trusted and untrusted hosts on a single port on a DHCP Snooping switch - the port is either trusted or untrusted and that defines the trust level for everyone connected to that port).
In some sites the WAN router is the DHCP server so I can treat that as a trusted port?
Yes, that is correct. On the WAN router, you will have to configure the following command:
ip dhcp relay information trust-all
The reason is that the DHCP Snooping switch adds a specific DHCP option to all relayed DHCP messages from clients (the so-called Option-82) but does not fill in the address of the relay agent (because there is no relay agent at all). Cisco's implementation of DHCP server does not like seeing this option in DHCP messages that do not carry relay agent IP address (it is a kind of validation check). The command I've just mentioned deactivates this check.
Regarding the Option-82, there is much misunderstanding about it. It is often suggested to deactivate its insertion. I am strongly against such recommendations unless there is a provable case that the DHCP Snooping deployment won't be working with Option-82. I suggest checking out this discussion:
https://supportforums.cisco.com/thread/2060498
In some sites we use the switch as the DHCP server so I guess I don't need to do anything with that?
If the DHCP server runs on the same switch that also performs DHCP Snooping then there is no additional configuration necessary besides turning the DHCP Snooping on, of course.
Best regards,
Peter
01-14-2013 02:18 AM
Hi Andy,
Yes ,Also trunk link between switches should be trusted.
2. Will this cause an issue with hubs as (I know) in som esites we have a hub or 2 plugged into a switch due to a loack of floor ports?
No Issue with port connected to hub.
3 In some sites the WAN router is the DHCP server so I can treat that as a trusted port?
Yes you can
4.In some sites we use the switch as the DHCP server so I guess I don't need to do anything with that?
Again if this switch is connected to another switch that port should be trusted.
Regards
Praveen
01-14-2013 12:58 AM
Hi Andy,
The primary goal of using DHCP Snooping is to enforce DHCP security. When you enable DHCP Snooping on a switch, it starts treating every port asconnected to a DHCP client (e.g. workstation, or some downstream switch). For such ports, also called “untrusted” ports, the switch applies DHCP messagefiltering, only accepting messages expected from DHCP Clients(DHCPREQUEST, DHCPDISCOVER, DHCPRELEASE). The switch allows any type of DHCP messages on trusted ports.
command on the ports connected to DHCP servers or uplink ports on access switchesYou mayexplicitly configure a port as trusted by the DHCP Snooping process using the
interface-level command
ip dhcp snooping trust. Usually, you need this
Hope you understood
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide