cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
859
Views
0
Helpful
5
Replies

DHCP snooping question

Andy White
Level 3
Level 3

Hello,

I have created a new VLAN and want to enable DHCP snooping to stop someone putting a DHCP device onthe network (has happened before).  I read that I must put ports connected to hosts into trusted port mode, so what happens when a user takes his PC out and puts a DHCP device into that port?

Thanks

5 Replies 5

Peter Paluch
Cisco Employee
Cisco Employee

Hello Andy,

 I read that I must put ports connected to hosts into trusted port mode

That must be a misinterpretation. Ports towards normal hosts must be in the untrusted mode. Only ports between switches and ports towards DHCP servers should be configured as trusted ports.

Best regards,

Peter

Thanks guys.

  1. So I treat ports connected to hosts as untrusted and trunks or ports connected to DHCP servers as trusted?
  2. Will this cause an issue with hubs as (I know) in som esites we have a hub or 2 plugged into a switch due to a loack of floor ports?
  3. In some sites the WAN router is the DHCP server so I can treat that as a trusted port?
  4. In some sites we use the switch as the DHCP server so I guess I don't need to do anything with that?

Regards

Hello Andy,

So I treat ports connected to hosts as untrusted and trunks or ports connected to DHCP servers as trusted?

Correct.

Will this cause an issue with hubs as (I know) in som esites we have a  hub or 2 plugged into a switch due to a loack of floor ports?

There will be no issues as long as the hub connects only to untrusted or only to trusted devices (you can not mix trusted and untrusted hosts on a single port on a DHCP Snooping switch - the port is either trusted or untrusted and that defines the trust level for everyone connected to that port).

In some sites the WAN router is the DHCP server so I can treat that as a trusted port?

Yes, that is correct. On the WAN router, you will have to configure the following command:

ip dhcp relay information trust-all

The reason is that the DHCP Snooping switch adds a specific DHCP option to all relayed DHCP messages from clients (the so-called Option-82) but does not fill in the address of the relay agent (because there is no relay agent at all). Cisco's implementation of DHCP server does not like seeing this option in DHCP messages that do not carry relay agent IP address (it is a kind of validation check). The command I've just mentioned deactivates this check.

Regarding the Option-82, there is much misunderstanding about it. It is often suggested to deactivate its insertion. I am strongly against such recommendations unless there is a provable case that the DHCP Snooping deployment won't be working with Option-82. I suggest checking out this discussion:

https://supportforums.cisco.com/thread/2060498

In some sites we use the switch as the DHCP server so I guess I don't need to do anything with that?

If the DHCP server runs on the same switch that also performs DHCP Snooping then there is no additional configuration necessary besides turning the DHCP Snooping on, of course.

Best regards,

Peter

Hi Andy,

  1. So I treat ports connected to hosts as untrusted and trunks or ports connected to DHCP servers as trusted?

Yes ,Also trunk link between switches should be trusted.

2. Will this cause an issue with hubs as (I know) in som esites we have a hub or 2 plugged into a switch due to a loack of floor ports?

  No Issue with port  connected to hub.

3 In some sites the WAN router is the DHCP server so I can treat that as a trusted port?

Yes you can

4.In some sites we use the switch as the DHCP server so I guess I don't need to do anything with that?

Again if this switch is connected to another  switch  that port should be trusted.

Regards

Praveen

Praveen AR
Level 1
Level 1

Hi Andy,

The primary goal of using DHCP Snooping is to enforce DHCP security. When you enable DHCP Snooping on a switch, it starts treating every port asconnected to a DHCP client (e.g. workstation, or some downstream switch). For such ports, also called “untrusted” ports, the switch applies DHCP messagefiltering, only accepting messages expected from DHCP Clients(DHCPREQUEST, DHCPDISCOVER, DHCPRELEASE). The switch allows any type of DHCP messages on trusted ports.

command on the ports connected to DHCP servers or uplink ports on access switches

You mayexplicitly configure a port as trusted by the DHCP Snooping process using the

interface-level command

ip dhcp snooping trust. Usually, you need this

Hope you understood

Review Cisco Networking for a $25 gift card