HP 6125G HP 6125G & 6125G/XG Blade Switches Layer 3 - IP Services Comm - Page 66

dhcp-snooping trust

Page 66 highlights

strategy append command is the primary device and a device configured with some other strategy is a secondary device. After you use the string user-string option to configure sub-option 9, the device uses the ASCII code type to pad the characters into sub-option 9 in the order that they are configured. When the total length of all sub-options reaches 255, the device stops padding automatically. The sub-option 9 content configured only applies to the VLAN that is specified by the vlan vlan-id option. If no VLAN ID is specified, the sub-option 9 content applies to all VLANs. A VLAN prefers its own sub-option 9 content over the one configured for all VLANs. Related commands: dhcp-snooping information format, dhcp-snooping information strategy, and display dhcp-snooping information. Examples # Configure the user-defined sub-option 9 as group001. system-view [Sysname] interface GigabitEthernet 1/0/1 [Sysname-GigabitEthernet1/0/1] dhcp-snooping information sub-option 9 string group001 dhcp-snooping trust Syntax dhcp-snooping trust [ no-user-binding ] View undo dhcp-snooping trust Layer 2 Ethernet port view, Layer 2 aggregate interface view Default level 2: System level Parameters no-user-binding: Specifies the port not to record the clients' IP-to-MAC bindings in DHCP requests it receives. The command without this keyword records the IP-to-MAC bindings of clients. Description Use dhcp-snooping trust to configure a port as a trusted port. Use undo dhcp-snooping trust to restore the default state of a port. All ports are untrusted by default. After enabling DHCP snooping, you need to specify the ports connected to the valid DHCP servers as trusted to make sure that DHCP clients can obtain valid IP addresses. Related commands: display dhcp-snooping trust. Examples # Specify GigabitEthernet 1/0/1 as a trusted port and enable it to record the IP-to-MAC bindings of clients. system-view [Sysname] interface GigabitEthernet 1/0/1 [Sysname-GigabitEthernet1/0/1] dhcp-snooping trust 59

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181

59
strategy append
command is the primary device and a device configured with some other strategy is a
secondary device.
After you use the
string
user-string
option to configure sub-option 9, the device uses the ASCII code type
to pad the characters into sub-option 9 in the order that they are configured. When the total length of all
sub-options reaches 255, the device stops padding automatically.
The sub-option 9 content configured only applies to the VLAN that is specified by the
vlan
vlan-id
option.
If no VLAN ID is specified, the sub-option 9 content applies to all VLANs. A VLAN prefers its own
sub-option 9 content over the one configured for all VLANs.
Related commands:
dhcp-snooping information format
,
dhcp-snooping information strategy
, and
display dhcp-snooping information
.
Examples
# Configure the user-defined sub-option 9 as group001.
<Sysname> system-view
[Sysname] interface GigabitEthernet 1/0/1
[Sysname-GigabitEthernet1/0/1] dhcp-snooping information sub-option 9 string group001
dhcp-snooping trust
Syntax
dhcp-snooping trust
[
no-user-binding
]
undo dhcp-snooping trust
View
Layer 2 Ethernet port view, Layer 2 aggregate interface view
Default level
2: System level
Parameters
no-user-binding
: Specifies the port not to record the clients’ IP-to-MAC bindings in DHCP requests it
receives. The command without this keyword records the IP-to-MAC bindings of clients.
Description
Use
dhcp-snooping trust
to configure a port as a trusted port.
Use
undo dhcp-snooping trust
to restore the default state of a port.
All ports are untrusted by default.
After enabling DHCP snooping, you need to specify the ports connected to the valid DHCP servers as
trusted to make sure that DHCP clients can obtain valid IP addresses.
Related commands:
display dhcp-snooping trust
.
Examples
# Specify GigabitEthernet 1/0/1 as a trusted port and enable it to record the IP-to-MAC bindings of
clients.
<Sysname> system-view
[Sysname] interface GigabitEthernet 1/0/1
[Sysname-GigabitEthernet1/0/1] dhcp-snooping trust