cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
546
Views
0
Helpful
6
Replies

Why is DHCP Snooping Applied on a VLAN Basis?

TariqMK
Level 1
Level 1

Just a basic question I have, I am familiar with the basics of DHCP Snooping. I understand that it marks ports as untrusted by default and disregards DHCP replied from them in order to prevent MITM attacks.

What I don't understand however, is why this is applied on a per VLAN basis.

From the official CCNP Study Guide, listing a specific VLAN for enabling DHCP Snooping seems to be obligatory.

However as per my understanding, shouldn't such a feature be enabled globally on a Switch, and then trusted ports allowed manually?

What is the benefit/reason to allowing it on a per VLAN basis?

1 Accepted Solution

Accepted Solutions

I have also had issues on 4510's where there is not enough TCAM to physically enable DHCP snooping on every port on every VLAN.  Each port has a phone (on one VLAN) and a workstation (on a different VLAN).

I can reduce the TCAM usage a lot by turning it off for the VoIP VLAN.

View solution in original post

6 Replies 6

Philip D'Ath
VIP Alumni
VIP Alumni

Consider a trunk port with say three vlans, and you only want to do snooping on one of those vlans.

But what reason would there be to enable snooping only on one VLAN? If we did so, wouldn't the other VLANs be unprotected and therefore vulnerable to MITM attacks from a rogue server?

I typically don't use DHCP snooping on server VLANs.  The danger of something going wrong and taking out a whole server is too great.

I typically only use it on workstation vlans.

OK, I think I might understand the logic behind this now.

So DHCP Snooping is applied on the Access Layer on the VLANs used by workstations.

This is because the most likely scenario of a rogue DHCP server being added would be from Users.

Therefore to save resources (as you mentioned) we only apply it on Switches and VLANs closest and in use by these End Users.

Would this be correct?

In this case, yes.  Typically I only apply it where I think there is reasonable risk, which is usually where humans can connect.

I have also had issues on 4510's where there is not enough TCAM to physically enable DHCP snooping on every port on every VLAN.  Each port has a phone (on one VLAN) and a workstation (on a different VLAN).

I can reduce the TCAM usage a lot by turning it off for the VoIP VLAN.

Review Cisco Networking for a $25 gift card