D-Link DGS-3200-16 User Manual - Page 118

DHCP Server Screening, DHCP Screening Port Settings, DHCP Offer Filtering

Page 118 highlights

xStack® DGS-3200 Series Layer 2 Gigabit Ethernet Managed Switch DHCP Server Screening The DHCP Server Screening folder contains two windows: DHCP Screening Port Settings and DHCP Offer Filtering. DHCP Screening Port Settings The Switch supports DHCP Server Screening, a feature that denies access to rogue DHCP servers. When the DHCP server filter function is enabled, all DHCP server packets will be filtered from a specific port. To view the following window, click Security > DHCP Server Screening > DHCP Screening Port Settings: Figure 5 - 11. DHCP Screening Port Settings window The user may set the following parameters: Parameter Description From DHCP Server Enable or disable this feature. Trap Log State Illegal Server Log Choose an illegal server log suppress duration of 1 minute, 5 minutes, or 30 minutes. Suppress Duration From Port/To Port A consecutive group of ports may be configured starting with the selected port. State Choose Enabled to enable the DHCP server screening or Disabled to disable it. The default is Disabled. After setting the previous parameters, click Apply to allow your changes to be implemented. DHCP Offer Filtering This function allows the user to not only restrict all DHCP Server packets but also to receive any specified DHCP server packet by any specified DHCP client, it is useful when one or more DHCP servers are present on the network and both provide DHCP services to different distinct groups of clients. The first time the DHCP filter is enabled it will create both an access profile entry and an access rule per port entry, it will also create other access rules. These rules are used to block all DHCP server packets. In addition to a permit DHCP entry, it will also create one access profile and one access rule entry the first time the DHCP client MAC address is used as the client MAC address. The Source IP address is the same as the DHCP server's IP address (UDP source port number 67). These rules are used to permit the DHCP server packets with specific fields, which the user has configured. To view the following window, click Security > DHCP Server Screening > DHCP Offer Filtering: 105

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273

xStack
®
DGS-3200 Series Layer 2 Gigabit Ethernet Managed Switch
105
DHCP Server Screening
The
DHCP Server Screening
folder contains two windows:
DHCP Screening Port Settings
and
DHCP Offer Filtering
.
DHCP Screening Port Settings
The Switch supports DHCP Server Screening, a feature that denies access to rogue DHCP servers.
When the DHCP server filter function is enabled, all DHCP server packets will be filtered from a specific port.
To view the following window, click
Security > DHCP Server Screening > DHCP Screening Port Settings
:
Figure 5 - 11. DHCP Screening Port Settings window
The user may set the following parameters:
Parameter
Description
From DHCP Server
Trap Log State
Enable or disable this feature.
Illegal
Server
Log
Suppress Duration
Choose an illegal server log suppress duration of 1 minute, 5 minutes, or 30 minutes.
From Port/To Port
A consecutive group of ports may be configured starting with the selected port.
State
Choose
Enabled
to enable the DHCP server screening or
Disabled
to disable it. The default
is
Disabled
.
After setting the previous parameters, click
Apply
to allow your changes to be implemented.
DHCP Offer Filtering
This function allows the user to not only restrict all DHCP Server packets but also to receive any specified DHCP server packet by
any specified DHCP client, it is useful when one or more DHCP servers are present on the network and both provide DHCP
services to different distinct groups of clients. The first time the DHCP filter is enabled it will create both an access profile entry
and an access rule per port entry, it will also create other access rules.
These rules are used to block all DHCP server packets. In
addition to a permit DHCP entry, it will also create one access profile and one access rule entry the first time the DHCP client
MAC address is used as the client MAC address. The Source IP address is the same as the DHCP server’s IP address (UDP source
port number 67). These rules are used to permit the DHCP server packets with specific fields, which the user has configured.
To view the following window, click
Security > DHCP Server Screening > DHCP Offer Filtering
: